For businesses to remain safe, software teams should focus on third-party suppliers

by Chris Bubinas • No Comments

For businesses to remain safe, software teams should focus on third-party suppliers

Dark Reading highlighted both the danger posed by unreliable supply chain security, as well as critical steps that companies can take to protect themselves. Key to such efforts are the use of high-quality tools, such as static analysis and open...

Read More »

Webinar recap: Top tactics to reduce your open source security risk

by Roy Sarkar • No Comments

Webinar recap: Top tactics to reduce your open source security risk

The current state of open source software (OSS) security may surprise you – with over 13 billion OSS component requests annually, a surprising 60% of organizations do not track security vulnerabilities in their code. This is a big reason...

Read More »

Heartbleed may ultimately prove beneficial for open source security

by Chris Bubinas • No Comments

Heartbleed may ultimately prove beneficial for open source security

The discovery and response to Heartbleed will actually prove to be beneficial for the cause of open source security...

Read More »

Webinar recap: Five ways to create more secure code

by Roy Sarkar • No Comments

Webinar recap: Five ways to create more secure code

We recently held a webinar discussing software risks and organizational impacts that arise from security flaws in code (you can watch the recording here). Hacking, data breaches, and functional failures are just the tip of the iceberg when it...

Read More »

HPC market continues to grow

by Chris Bubinas • No Comments

HPC market continues to grow

High performance computing continues to experience rising popularity as more organizations recognize the benefits offered by these systems...

Read More »

New application security concerns emerging

by Chris Bubinas • No Comments

New application security concerns emerging

No matter how exhaustive an expert's knowledge may be, changes will inevitably demand new approaches to achieve security...

Read More »

Static Analysis

Webinar recap: Static analysis’ role in automotive functional safety

July 24, 2014, Roy Sarkar - No Comments

Webinar recap: Static analysis’ role in automotive functional safety

Last week, we held a joint webinar with QNX Software Systems discussing how static analysis plays a key role in automotive functional safety and ISO...

Software Security

For businesses to remain safe, software teams should focus on third-party suppliers

August 15, 2014, Chris Bubinas - No Comments

For businesses to remain safe, software teams should focus...

Dark Reading highlighted both the danger posed by unreliable supply chain security, as well as critical steps that companies can take to protect...

Coding Standards

Creating a universal language for the Internet of Things

May 28, 2014, Chris Bubinas - No Comments

Creating a universal language for the Internet of Things

Individuals and organizations alike are already enjoying the benefits of an increasingly intertwined tech environment, and the IoT is poised to take this standard of connectivity to the next level...

High Performance Computing

Johns Hopkins research combines HPC and virtualization for first time

August 16, 2014, Chris Bubinas - No Comments

Johns Hopkins research combines HPC and virtualization for first...

A researcher at Johns Hopkins University managed to overcome a long-standing hurdle by combining HPC with virtualization...

Open Source

Open source adds life to older software

August 18, 2014, Chris Bubinas - No Comments

Open source adds life to older software

Companies are now turning to open source as an effective safeguard against the risk of proprietary software collapsing due to the failure of the...

Embedded Software

With focus on Internet of Things security growing, what concerns await for embedded software developers?

February 10, 2014, Chris Bubinas - No Comments

With focus on Internet of Things security growing, what...

Even as the Internet of Things is expected to see rapid growth in the next few years, the security threats associated with more connected devices are...

Android Development

Adopting mobile application practices requires planning

May 12, 2014, Chris Bubinas - No Comments

Adopting mobile application practices requires planning

As the mobile landscape evolves and matures, companies must plan how they will build new software to meet changing expectations...

Scroll to top