Recommended Application Security Testing (AST) Techniques

There are some very interesting takeaways from Gartner’s recent report “How to Deploy and Perform Application Security...

Webinar Recording - Combining SAST, Lean, Shift Left, DevSecOps

 

Wondering what you can do to maximize the efficiency of...

Software Trustworthiness Best Practices for IIoT

The Industrial Internet Consortium (IIC) recently released their white paper “Software Trustworthiness Best Practices” which...

MISRA C:2012 Rule 1.3 and the Dark Underbelly of C and C++

MISRA C is a set of guidelines for the safe use of the C programming language mainly targeted for its use in safety-critical...

How to Configure GrammaTech CodeSonar to Support Your Work from Home Environment

These are unusual times for businesses around the world and the people that work in them. All of a sudden, we have all the...