Software Assurance            Software Hardening            Autonomic Computing
Reducing the Risk of the Software Supply Chain in Medical Devices

INTRODUCTION:

Medical devices rely on third-party and in-house existing software as needed, to meet functionality, cost, and...

New Approaches Needed for Medical Device Software Development

INTRODUCTION:

Modern medical devices are gaining complexity, and as connectivity to the internet, cloud, and outside world...

How Vulnerable Are You?

INTRODUCTION:

The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?"...

Don’t trust any input! Prevent vulnerabilities from becoming exploits with tainted data analysis

INTRODUCTION:

One of the most common attack vectors is user (or other) input into a system. It's very risky to...