Top White Papers

The business case for earlier software defect detection and compliance

Regardless of the industry your business operates in, software is likely all around it. Software powers our cars, airplanes, and even the medical devices we rely on to diagnose and treat illness...

Continue Reading Here

Open source software - security risks and best practices

Understanding the risks associated with open source in general, and the security profile of specific projects, can help organizations minimize their total cost of ownership.

Continue Reading Here

The business case for earlier software defect detection and compliance

Regardless of the industry your business operates in, software is likely all around it. Software powers our cars, airplanes, and even the medical devices we rely on to diagnose and treat illness...

Continue Reading Here

Defend against injection attacks

This paper explores the risk of injection attacks, how to prevent these vulnerabilities in your software, and how static code analysis can help.

Continue Reading Here

White Papers

Software as a process

Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors.

This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number of industries can be applied to your organization to reduce defects, meet requirements, and minimize costs.

Continue Reading Here

Coding to standards and quality: supply-chain application development

The monolithic codebase is dead. Modern applications are built of code from a variety of sources including employees, partners, and contractors from different geographies, with different skill levels, and working on a number of platforms. Application development is a supply chain, with dependencies supported by a network of systems ranging from greenfield development to legacy integrations, and utilizing a patchwork of code from custom, open-source, and commercial third-party sources. Ensuring consistency, security, and standards in such an environment can be challenging, but is essential for maintaining reputation, relationships, and customers.

Continue Reading Here

Displaying results 1-10 (of 22)
 |<  < 1 - 2 - 3  >  >|