Software Assurance            Software Hardening            Autonomic Computing
Thwarting Insider Attacks with Advanced Static Analysis

INTRODUCTION:

The security threat posed by insiders is often underestimated. According to an IBM study, 32% of attackers...

Cyber Grand Challenge at the Smithsonian

The Cyber Grand Challenge was created by DARPA (Defense Advanced Research Projects Agency) to advance the state of security...

How to Use Static Analysis to Improve NERC Critical Infrastructure Protection Compliance

INTRODUCTION:

Securing connected industrial control systems (ICS) or Supervisory Control and Data Acquisition (SCADA) for...

Managing Third-Party Code Security and Quality with Binary Analysis

INTRODUCTION:

According to VDC Research, 45% of embedded projects involve outsourcing product development. The use of...

The Role of Static Analysis in a Secure Software Development Life Cycle (SDLC)

INTRODUCTION:

"When should static analysis be applied?" The answer to this question is fairly straightforward: "whenever...