Top three tips for ensuring software supply chain security
At a time when “software supply chain attack” has become a household phrase, the recent vulnerability discovered in the Apache ...
SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity
The World Forum for Harmonization of Vehicle Regulations (WP.29) of the United Nations Economic Commission for Europe (UNECE)...
TCP/IP stacks vulnerabilities are a wake-up call for embedded software
URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...
GrammaTech IronBank Container for CodeSonar and Wind River VxWorks
The IronBank (also known as the DoD Centralized Artifacts Repository) is a collection of signed container images for both open...