Software Assurance            Software Hardening            Autonomic Computing
How to Use Static Analysis to Improve NERC Critical Infrastructure Protection Compliance

INTRODUCTION:

Securing connected industrial control systems (ICS) or Supervisory Control and Data Acquisition (SCADA) for...

Managing Third-Party Code Security and Quality with Binary Analysis

INTRODUCTION:

According to VDC Research, 45% of embedded projects involve outsourcing product development. The use of...

The Role of Static Analysis in a Secure Software Development Lifecycle

INTRODUCTION:

"When should static analysis be applied?" The answer to this question is fairly straightforward: "whenever...

Software Forensics: Beyond the Law

INTRODUCTION:

Traditionally, the term "forensics" is the use of science to discover evidence of criminal activity. Extending...

Homeland Security Issues Guidance on IoT Security

INTRODUCTION:

The Department of Homeland Security (DHS) published its recent IoT security guidelines after many months of...