Software Assurance            Software Hardening            Autonomic Computing
Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

INTRODUCTION:

The Internet of Things is coming to industrial systems in a big way (the “IIOT”). But IIOT isn't just IOT with...

Reducing the Risk of the Software Supply Chain in Medical Devices

INTRODUCTION:

Medical devices rely on third-party and in-house existing software as needed, to meet functionality, cost, and...

How Vulnerable Are You?

INTRODUCTION:

The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?"...

Don’t trust any input! Prevent vulnerabilities from becoming exploits with tainted data analysis

INTRODUCTION:

One of the most common attack vectors is user (or other) input into a system. It's very risky to...