Top three tips for ensuring software supply chain security

At a time when “software supply chain attack” has become a household phrase, the recent vulnerability discovered in the Apache ...

SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity

The World Forum for Harmonization of Vehicle Regulations (WP.29) of the United Nations Economic Commission for Europe (UNECE)...

TCP/IP stacks vulnerabilities are a wake-up call for embedded software

URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...

GrammaTech IronBank Container for CodeSonar and Wind River VxWorks

The IronBank (also known as the DoD Centralized Artifacts Repository) is a collection of signed container images for both open...