A Practical Approach to Shifting Security Left

There are two important considerations when adding security to an existing DevOps pipeline. The first is security in code,...

TCP/IP stacks vulnerabilities are a wake-up call for embedded software

URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...

As drone adoption soars, expect greater regulation of embedded code

Software safety and security will become more closely scrutinized as the commercial drone industry grows.

GrammaTech Releases CodeSonar Version 6.2 Focused on Enabling DevSecOps
Ready for DevSecOps

GrammaTech’s CodeSonar static application security testing (SAST) solution already has great integrations...

Log4j 2 Vulnerability – Practical Advice and What’s Next for Software Supply Chain Security

If you are a cybersecurity or DevOps professional, you have probably had a very hectic 96 hours and probably many more to come....