Deliver secure software faster

On-Demand Webinar

Code security and time to market matter. Static analysis testing is proven to be effective at delivering better software faster for highly regulated industries such as automotive, medical, and military/defense. However, this critical step is often introduced too late in the process.Join Electric Cloud and Rogue Wave Software as we demonstrate a repeatable and predictable way to reduce security vulnerabilities, ensure compliance, and minimize overall risks earlier in the software development lifecycle.In this webinar you will learn: How static analysis eliminates security threats and helps achieve compliance to security standards How acceleration enables more testing as part of your Continuous Integration (CI) flow How errors are quickly detected and quality is optimized

Learn More

Organizations today face increasing threats to their data, from ever-more nefarious, cutting-edge hackers who put any large company with a website or an app at risk. But there are steps that can be taken to thwart the theft of digital data: Ensure compliance to standards. There are several code security standards out there, but the question is, how do organizations understand what they mean and apply them to their own software development efforts. Identify security flaws across the organization. Code coming from your developers, COTS and (most suspect) open source can all have potentially damaging flaws. Stay informed with reporting and metrics. Organizations must measure and gauge the effectiveness of their defect reduction efforts.

Learn More

Security breaches can happenSoftware security is making headlines today, whether it's the exposure of private information or critical systems being compromised. It's more important than ever for developers to understand why secure code matters and how to create safer applications.How will you protect your organization?This webinar explains how security breaches occur and identifies steps you can take to reduce the risk of your application being compromised. After attending this webinar, you'll be able to combat critical risks and malicious attacks.

Learn More

Developers in the automotive software supply chain are spending more time and effort -- and consequently money -- on the latter stages of development to get the product ready. These developers need to deliver code with less defects, applications secure from hacking vulnerabilities, and products that conform to critical safety and security standards. Navigating the day-to-day issues of automotive software development can be overwhelming, but with little effort it can be easily managed.  

Learn More

Developing software for mission-critical applications such as military, aerospace, and medical devices requires aggressive strategies for reducing risk throughout the development lifecycle. This webinar looks at three crucial components of an effective risk management strategy that can be achieved with source code analysis, including stabilizing code early in development, automating metrics and measurement, and creating a disciplined approach to producing maintainable code.Presented by:  Todd Landry, Senior Product Manager, Klocwork

Learn More

Software security is making headlines today, whether it's the exposure of private information or critical systems being compromised. It's more important than ever for developers to understand why secure code matters and how to create safer applications. This webinar explains how security breaches occur and identifies steps you can take to reduce the risk of your application being compromised.In this one-hour webinar designed for developers and testers, you'll learn about: Common threats that affect software systems today Software security standards such as CWE and OWASP Real examples of how to find and fix vulnerabilities in codePresented by:  Art Dahnert, security product manager, Klocwork

Learn More

​The increase in the volume and complexity of software code in recent years is indisputable. Unfortunately, the larger, more complex software projects of today inevitably result in higher volumes of security vulnerabilities and defects within these code bases, exposing potential for security breaches or system failures. In this webcast, VDC will share results from its latest research and discuss: Trends affecting embedded software development Leading challenges driving code security and complexity issues in next-generation systems Critical considerations for software testing best practicesPresented by: Chris Rommel, Vice-President, M2M & Embedded Systems Research, VDC

Learn More

A good vulnerability management program includes tools, manual techniques, a security defect classification system and, most importantly, the knowledge to remediate vulnerabilities quickly and accurately. Watch this on-demand webinar to learn how to effectively combine these components and build more secure software with each release.Presented by: Gwyn Fisher, CTO, Klocwork Jason Taylor, CTO, Security Innovation

Learn More

Are code reviews keeping pace?

On-Demand Webinar

Forrester Research reviews the findings of a recent code review study and discusses why it’s time for software development organizations to exploit modern technology to improve the code review process. Learn about the key challenges of code review and recommendations on ways to improve the process right from the analyst himself.

Learn More

Learn where static code analysis can be used in your development process, the problems that it solves, and how the technology can be used to streamline a number of productivity bottlenecks in your development process.Presented by: Brendan Harrison, director of marketing, Klocwork Alen Zukich, director of product management, Klocwork

Learn More

Software security breaches can happen in many places, including at the source code level. Opportunities for vulnerable code breaches are often created innocently enough, sometimes because we don't know what to look for.In this one-hour webinar designed for software engineers, you'll learn how to: Recognize a potential data breach in web, desktop and mobile applications Quickly assess the impact of identified breaches Identify potential application security problems in your code Use automated tools like static and dynamic analysis for weakness detectionPresented by: Art Dahnert, security product manager, Klocwork

Learn More

See how easy it is to exploit security vulnerabilities caused by common software defects. Watch how a simple hack on an older version of Firefox enables a hacker to gain full access to a remote machine. More importantly, see how this same vulnerability could have been prevented through the use of static analysis.Presented by: Brendan Harrison, product marketing manager, Klocwork Alen Zukich, manager, field engineering, Klocwork  

Learn More

The complexity of porting or developing for multicore or multiprocessor architectures can lead to increased project expenses and timelines. Learn how Klocwork overcomes these challenges, equipping developers with a personal mentor to detail critical concurrency and endian incompatibility issues as they're introduced.Presented by: Gwyn Fisher, CTO, Klocwork  

Learn More

In an Agile context where software production is performed in short, feature-driven iterations, it's critical that bugs are found and removed from code as early as possible. Examine the evolution of source code analysis technology and how it should be deployed for maximum benefit within an Agile development process.Presented by: Todd Landry, senior product manager, Klocwork  

Learn More

The level of concurrency in automotive systems is increasing rapidly. With multithreaded code on multicore processors, the balance between dynamic analysis of code and static analysis of design and code is tipping heavily in favor of the latter.While not a complete replacement for traditional testing methods, testing by analysis plays a major role in effective verification and validation - as reflected in many of the safety standards. ISO 13849 makes it explicit:"When validation by analysis is not conclusive, testing shall be carried out to complete the validation. Testing is always complementary to analysis and is often necessary."

Learn More

Automating key steps in the development lifecycle - including defect detection, builds and deployments - offers important productivity benefits for development organizations. The ability to immediately assess the impact of changes, generate continuous feedback on product stability, and reduce the effort associated with fixing issues found late in the cycle allows development teams to focus on creating higher quality products in less time. Presented by: Alen Zukich, director, product management, Klocwork Jeffrey Fredrick, technical evangelist, UrbanCode  

Learn More

Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack.Learn about: Common attacks, threats and security considerations for embedded software Using static analysis to find and fix security vulnerabilities Application whitelisting – preventing malware and unauthorized changes Employing threat modeling as a defensive measure against security threatsPresented by: Gwyn Fisher, CTO, Klocwork Edward Adams, CEO, Security Innovation Paul Paget, CEO, Savant Protection  

Learn More

To ensure your embedded software is secure, you must start by understanding the threats that can make it susceptible to attack and then establish appropriate counter measures. Designed for embedded software engineers and security specialists, this webinar identifies the characteristics of embedded software that make it vulnerable to security threats, discusses the importance of threat modeling, and provides specific mitigation activities all embedded teams should employ.Presented by: Gwyn Fisher, CTO, Klocwork Jason Taylor, CTO, Security Innovation  

Learn More

Overview: Automotive software development organizations are under increasing pressure to deliver code that's compliant to standards, protected from the threat of hackers, and free of defects that could result in expensive recalls. Traditional testing methods are falling by the wayside in favor of leaner, more effective techniques that get your software verified and validated faster. In this webinar, you'll learn how the industry's focus on functional safety and cyber security has organizations adopting automated tools for defect discovery and standards compliance – achieving faster time to market and reduced risk.Attendees Will Learn: How to get ISO 26262 and MISRA compliance faster How to protect your code from security threats How static analysis reduces verification and validation effort.Presented by: Jamie Torok, Senior Sales Engineer, Klocwork  

Learn More

The future of automotive will feature vehicle to vehicle communications for enhanced safety and the ability to integrate personal mobile devices into the car to provide improved information and a better entertainment experience. The benefits and convenience are significant – but what’s the impact of this increased connectivity? Is it possible for a security hole or rogue application on your cell phone to get into the power train in your car? What are the critical software security issues, best practices and mitigation techniques automotive developers need to know? Join us as embedded security experts discuss the unique requirements and security issues within an automotive environment.

Learn More

As automotive software grows more complex and connected, development organizations are under increasing pressure to deliver code that's protected from the threat of hackers and free of compliance gaps (not to mention, free of defects as well). Development has also shifted to a software supply chain model where build integration not only includes your code but that of many different sources that offer no guarantee of security and integrity.  How do you ensure that code coming in meets your standards and satisfies your customer requirements – to avoid expensive recalls, compromised privacy, and reduced safety?

Learn More

Protect Your Organization’s Software From Attack This webinar explains how security breaches occur and identifies steps to reduce the risk of an application being compromised. After attending this webinar, people will be able to combat critical risks and malicious attacks. Learn about: Common threats that affect software systems today Software security standards such as CWE and OWASP How threat modelling helps mitigate security risks

Learn More

Learn how to build a comprehensive open source policy to embrace the value, while limiting the risks. Discover, define, and deploy OSS.Presented by:  Dave McLoughlin, director of auditing services, OpenLogicRead the recap blog, including poll results

Learn More