For businesses to remain safe, software teams should focus on third-party suppliers

by Chris Bubinas • No Comments

For businesses to remain safe, software teams should focus on third-party suppliers

Dark Reading highlighted both the danger posed by unreliable supply chain security, as well as critical steps that companies can take to protect themselves. Key to such efforts are the use of high-quality tools, such as static analysis and open...

Read More »

Webinar recap: Top tactics to reduce your open source security risk

by Roy Sarkar • No Comments

Webinar recap: Top tactics to reduce your open source security risk

The current state of open source software (OSS) security may surprise you – with over 13 billion OSS component requests annually, a surprising 60% of organizations do not track security vulnerabilities in their code. This is a big reason...

Read More »

Heartbleed may ultimately prove beneficial for open source security

by Chris Bubinas • No Comments

Heartbleed may ultimately prove beneficial for open source security

The discovery and response to Heartbleed will actually prove to be beneficial for the cause of open source security...

Read More »

Webinar recap: Five ways to create more secure code

by Roy Sarkar • No Comments

Webinar recap: Five ways to create more secure code

We recently held a webinar discussing software risks and organizational impacts that arise from security flaws in code (you can watch the recording here). Hacking, data breaches, and functional failures are just the tip of the iceberg when it...

Read More »

HPC market continues to grow

by Chris Bubinas • No Comments

HPC market continues to grow

High performance computing continues to experience rising popularity as more organizations recognize the benefits offered by these systems...

Read More »

New application security concerns emerging

by Chris Bubinas • No Comments

New application security concerns emerging

No matter how exhaustive an expert's knowledge may be, changes will inevitably demand new approaches to achieve security...

Read More »

Static Analysis

For effective application security, an updated strategy is needed

September 8, 2014, Chris Bubinas - No Comments

For effective application security, an updated strategy is needed

The Heartbleed revelation should encourage virtually every company to reconsider its application security policies, especially in regard to open...

Software Security

For effective application security, an updated strategy is needed

September 8, 2014, Chris Bubinas - No Comments

For effective application security, an updated strategy is needed

The Heartbleed revelation should encourage virtually every company to reconsider its application security policies, especially in regard to open...

Coding Standards

Creating a universal language for the Internet of Things

May 28, 2014, Chris Bubinas - No Comments

Creating a universal language for the Internet of Things

Individuals and organizations alike are already enjoying the benefits of an increasingly intertwined tech environment, and the IoT is poised to take this standard of connectivity to the next level...

High Performance Computing

Skills shortage holds back HPC potential

September 17, 2014, Chris Bubinas - No Comments

Skills shortage holds back HPC potential

A major skills shortage is one of the most significant factors preventing greater HPC growth...

Open Source

For effective application security, an updated strategy is needed

September 8, 2014, Chris Bubinas - No Comments

For effective application security, an updated strategy is needed

The Heartbleed revelation should encourage virtually every company to reconsider its application security policies, especially in regard to open...

Embedded Software

With focus on Internet of Things security growing, what concerns await for embedded software developers?

February 10, 2014, Chris Bubinas - No Comments

With focus on Internet of Things security growing, what...

Even as the Internet of Things is expected to see rapid growth in the next few years, the security threats associated with more connected devices are...

Android Development

Adopting mobile application practices requires planning

May 12, 2014, Chris Bubinas - No Comments

Adopting mobile application practices requires planning

As the mobile landscape evolves and matures, companies must plan how they will build new software to meet changing expectations...

Scroll to top