Security tests play a key role in successful health care app development

by Chris Bubinas • No Comments

Security tests play a key role in successful health care app development

Only by balancing security with usability can health care apps deliver functionality without compromising patient privacy...

Read More »

Data mining improves food contamination identification

by Chris Bubinas • No Comments

Data mining improves food contamination identification

IBM scientists and  German Federal Institute for Risk Assessment's Department of Biological Safety worked together to develop a means of using data mining to better combat food contamination outbreaks...

Read More »

Detecting command injection flaws (like Shellshock)

by Roy Sarkar • No Comments

Detecting command injection flaws (like Shellshock)

In this follow up to our last article about Shellshock, we’ll take a look at an example of a command injection flaw and see how Klocwork detects it. As a refresher, a command injection flaw is the result of improper or incorrect...

Read More »

Latest open source vulnerability further highlights importance of security

by Chris Bubinas • No Comments

Latest open source vulnerability further highlights importance of security

Shellshock should serve as motivation for companies relying on open source to shore up their security efforts...

Read More »

Reacting to Shellshock

by Roy Sarkar • No Comments

Reacting to Shellshock

The code security industry is reeling from news that a flaw in the widely-used GNU Bash shell, dubbed Shellshock, could enable attackers to hack into vulnerable systems around the world. There have already been reports of exploits seen live and...

Read More »

Preemptive solutions key for Java application development security

by Chris Bubinas • No Comments

Preemptive solutions key for Java application development security

John Matthew Holt recently singled out the need for organizations using Java to rethink their approach to application security. In particular, he emphasized the value of preemptive solutions, such as static code analysis tools...

Read More »

Static Analysis

Security tests play a key role in successful health care app development

October 20, 2014, Chris Bubinas - No Comments

Security tests play a key role in successful health...

Only by balancing security with usability can health care apps deliver functionality without compromising patient privacy...

Software Security

Detecting command injection flaws (like Shellshock)

October 10, 2014, Roy Sarkar - No Comments

Detecting command injection flaws (like Shellshock)

In this follow up to our last article about Shellshock, we’ll take a look at an example of a command injection flaw and see how Klocwork...

High Performance Computing

HPC delivers predictive analytics benefits

September 26, 2014, Chris Bubinas - No Comments

HPC delivers predictive analytics benefits

HPC tools, when combined with raw data, can yield sophisticated, useful predictions for organizations...

Open Source

Future of commercial open source software still unclear

October 17, 2014, Chris Bubinas - No Comments

Future of commercial open source software still unclear

It is difficult to predict whether commercial open source products will eventually prove viable...

Embedded Software

Webinar recap: Static analysis’ role in automotive functional safety

July 24, 2014, Roy Sarkar - No Comments

Webinar recap: Static analysis’ role in automotive functional safety

Last week, we held a joint webinar with QNX Software Systems discussing how static analysis plays a key role in automotive functional safety and ISO...

Analytics & Data Mining

Data mining used to develop comprehensive disease database

October 22, 2014, Chris Bubinas - No Comments

Data mining used to develop comprehensive disease database

In an effort to combat global disease outbreaks, researchers at the University of Liverpool are working to develop the world's most comprehensive...

Scroll to top