As automotive software grows more complex and connected, development organizations are under increasing pressure to deliver code that's protected from the threat of hackers and free of compliance gaps (not to mention, free of defects as well). Development has also shifted to a software supply chain model where build integration not only includes your code but that of many different sources that offer no guarantee of security and integrity.  How do you ensure that code coming in meets your standards and satisfies your customer requirements – to avoid expensive recalls, compromised privacy, and reduced safety?

Learn More

Protect Your Organization’s Software From Attack This webinar explains how security breaches occur and identifies steps to reduce the risk of an application being compromised. After attending this webinar, people will be able to combat critical risks and malicious attacks. Learn about: Common threats that affect software systems today Software security standards such as CWE and OWASP How threat modelling helps mitigate security risks

Learn More

Developing software for mission-critical applications such as military, aerospace, and medical devices requires aggressive strategies for reducing risk throughout the development lifecycle. This webinar looks at three crucial components of an effective risk management strategy that can be achieved with source code analysis, including stabilizing code early in development, automating metrics and measurement, and creating a disciplined approach to producing maintainable code.Presented by:  Todd Landry, Senior Product Manager, Klocwork

Learn More

Software security is making headlines today, whether it's the exposure of private information or critical systems being compromised. It's more important than ever for developers to understand why secure code matters and how to create safer applications. This webinar explains how security breaches occur and identifies steps you can take to reduce the risk of your application being compromised.In this one-hour webinar designed for developers and testers, you'll learn about: Common threats that affect software systems today Software security standards such as CWE and OWASP Real examples of how to find and fix vulnerabilities in codePresented by:  Art Dahnert, security product manager, Klocwork

Learn More

‚ÄčThe increase in the volume and complexity of software code in recent years is indisputable. Unfortunately, the larger, more complex software projects of today inevitably result in higher volumes of security vulnerabilities and defects within these code bases, exposing potential for security breaches or system failures. In this webcast, VDC will share results from its latest research and discuss: Trends affecting embedded software development Leading challenges driving code security and complexity issues in next-generation systems Critical considerations for software testing best practicesPresented by: Chris Rommel, Vice-President, M2M & Embedded Systems Research, VDC

Learn More

A good vulnerability management program includes tools, manual techniques, a security defect classification system and, most importantly, the knowledge to remediate vulnerabilities quickly and accurately. Watch this on-demand webinar to learn how to effectively combine these components and build more secure software with each release.Presented by: Gwyn Fisher, CTO, Klocwork Jason Taylor, CTO, Security Innovation

Learn More

Learn where static code analysis can be used in your development process, the problems that it solves, and how the technology can be used to streamline a number of productivity bottlenecks in your development process.Presented by: Brendan Harrison, director of marketing, Klocwork Alen Zukich, director of product management, Klocwork

Learn More

Software security breaches can happen in many places, including at the source code level. Opportunities for vulnerable code breaches are often created innocently enough, sometimes because we don't know what to look for.In this one-hour webinar designed for software engineers, you'll learn how to: Recognize a potential data breach in web, desktop and mobile applications Quickly assess the impact of identified breaches Identify potential application security problems in your code Use automated tools like static and dynamic analysis for weakness detectionPresented by: Art Dahnert, security product manager, Klocwork

Learn More

See how easy it is to exploit security vulnerabilities caused by common software defects. Watch how a simple hack on an older version of Firefox enables a hacker to gain full access to a remote machine. More importantly, see how this same vulnerability could have been prevented through the use of static analysis.Presented by: Brendan Harrison, product marketing manager, Klocwork Alen Zukich, manager, field engineering, Klocwork  

Learn More

Overview: Automotive software development organizations are under increasing pressure to deliver code that's compliant to standards, protected from the threat of hackers, and free of defects that could result in expensive recalls. Traditional testing methods are falling by the wayside in favor of leaner, more effective techniques that get your software verified and validated faster. In this webinar, you'll learn how the industry's focus on functional safety and cyber security has organizations adopting automated tools for defect discovery and standards compliance – achieving faster time to market and reduced risk.Attendees Will Learn: How to get ISO 26262 and MISRA compliance faster How to protect your code from security threats How static analysis reduces verification and validation effort.Presented by: Jamie Torok, Senior Sales Engineer, Klocwork  

Learn More

Displaying results 1-10 (of 18)
 |<  < 1 - 2  >  >|