Thwarting Insider Attacks with Advanced Static Analysis
INTRODUCTION:
The security threat posed by insiders is often underestimated. According to an IBM study, 32% of attackers are...
Interpreting CodeSonar for Binaries Results Part 2
INTRODUCTION:
In part one of this post, I talked about understanding the various pieces of information reported by GrammaTech...
Interpreting CodeSonar for Binaries Results Part 1
INTRODUCTION:
So you’ve installed CodeSonar for Binaries, set up your hub, and managed to perform an analysis. You are now...
Managing Third-Party Code Security and Quality with Binary Analysis
INTRODUCTION:
According to VDC Research, 45% of embedded projects involve outsourcing product development. The use of...