All Resources

Security in practice: Creating bulletproof software

The ramifications of a security lapse are well known to business executives. Many of the largest brands in the world, from Sony to Target to The Home Depot, have paid a heavy price for failing to protect customer information.

Consumers may be growing accustomed to the reality that data breaches are just one cost of our increasingly connected and online world. But as more people interact with embedded systems like those found in automobiles and healthcare devices, for example, the perceived risk of a security flaw is bound to increase, as will the level of outrage from consumers, legislators, and regulators.

Continue Reading Here

Software security begins with flaw-free, standards-compliant code

In partnership with Open Systems Media and IQPC, Rogue Wave conducted two research surveys to measure organizations across multiple vertical industries and job titles on how they approach application security and how they provide developers with the education and tools necessary to bake in security at the earliest stages of software development.

Continue Reading Here

Top 3 strategies to reduce risk in automotive / in-vehicle software development

Developing in-vehicle embedded applications is a safety, security, and quality challenge. Given that cars and trucks are increasingly connected to each other and to the devices around them, it’s becoming harder and harder to ensure that software is functional and free from risk. Development teams, especially the managers who are ultimately responsible, face incredible challenges when building such applications, and are learning that team members need to do more than just catch code defects during verification and validation testing. The new imperative: Identify and address security and compliance concerns earlier in the lifecycle, all while delivering innovative and differentiating features.

Continue Reading Here

Software as a process

Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors.

This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number of industries can be applied to your organization to reduce defects, meet requirements, and minimize costs.

Continue Reading Here

Coding to standards and quality: supply-chain application development

The monolithic codebase is dead. Modern applications are built of code from a variety of sources including employees, partners, and contractors from different geographies, with different skill levels, and working on a number of platforms. Application development is a supply chain, with dependencies supported by a network of systems ranging from greenfield development to legacy integrations, and utilizing a patchwork of code from custom, open-source, and commercial third-party sources. Ensuring consistency, security, and standards in such an environment can be challenging, but is essential for maintaining reputation, relationships, and customers.

Continue Reading Here

The business case for earlier software defect detection and compliance

Regardless of the industry your business operates in, software is likely all around it. Software powers our cars, airplanes, and even the medical devices we rely on to diagnose and treat illness.

Errors that are introduced in all of this software code can cause major problems down the road for software development organizations, application end users, and society in general. These problems usually relate to security, standards, or defects.

By providing developers with the right tools to detect, understand, and fix problems early, your business can simplify software development, shorten development lifecycles, and improve the quality of software code. The end result is increased innovation, secure applications, and a faster time to market — all at a lower cost.
 

Continue Reading Here

Displaying results 1-10 (of 18)
 |<  < 1 - 2  >  >|