All Resources

Revealed: Automotive sector isn't cut out to secure connected cars

Cars rely very heavily on software. In fact, electronic components can add up to half of cars' manufacturing costs.

New research from Rogue Wave reveals 90 percent of software developers working in the automotive space think it’s difficult to truly secure cars, and over half don’t even think their company has the necessary training/technology.

This is all pointing towards an automotive security crisis.

Continue Reading Here

Automotive industry: Welcome to the software business

​Remember when a car was just a car? The automotive industry was all about how fast, how far, how safe, and how reliable their cars were. And, they got very good at it, having decades of expertise in developing and promoting safety standards and performance benchmarks to ensure the safety — and loyalty — of their customers.

Enter the connected car. Now, the automotive industry finds itself at a crossroads.

Continue Reading Here

Top automotive security vulnerabilities

Trying to build connected automotive software that’s both bulletproof and secure is a big task; knowing where to focus time and energy can be half the challenge. According to research conducted by CX3 Marketing on behalf of Rogue Wave Software, nearly 90 percent of all detected security holes can be traced back to just ten types of vulnerabilities.

In this paper we’ll explore the ten most common vulnerabilities for 2015, with examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.

Continue Reading Here

Car cybersecurity: What do the automakers really think?

The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and tier one suppliers.

This paper analyzes the survey results, and provided new insights to help automotive software suppliers understand the current mindset of their developers and build security and safety into their software.
 

Continue Reading Here

Top 3 strategies to reduce risk in automotive / in-vehicle software development

Developing in-vehicle embedded applications is a safety, security, and quality challenge. Given that cars and trucks are increasingly connected to each other and to the devices around them, it’s becoming harder and harder to ensure that software is functional and free from risk. Development teams, especially the managers who are ultimately responsible, face incredible challenges when building such applications, and are learning that team members need to do more than just catch code defects during verification and validation testing. The new imperative: Identify and address security and compliance concerns earlier in the lifecycle, all while delivering innovative and differentiating features.

Continue Reading Here

Software as a process

Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors.

This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number of industries can be applied to your organization to reduce defects, meet requirements, and minimize costs.

Continue Reading Here

Displaying results 1-10 (of 11)
 |<  < 1 - 2  >  >| 
Category Tags
academic aerospace agile development Akana case study Akana datasheet Akana Lifecycle Manager Akana Platform Akana video Akana white paper API analytics API development API Gateway API management API microservices API portal API security Apigility automotive brochure brochures case study CentOS cloud CodeDynamics CodeDynamics video coding standards continuous delivery continuous integration data sheet datasheet debugging defect detection developer productivity DevOps digital media dynamic analysis ecommerce Elixir embedded analytics energy & environment enterprise php Expressive Family finance government HostAccess how-to HydraExpress IBM i IBM WebSphere DataPower IMSL IMSL C Library IMSL Family IMSL Fortran Library IMSL Java Library IMSL NET Library infographic insurance JMSL JViews Klocwork language: c language: java legal & compliance license life sciences & healthcare manufacturing MemoryScape MISRA mobile network and telecom equipment NoSQL OAuth OEM & ISV open banking open source Open Source Audit open source management open source support OpenLogic Other Industries php presentation product publishing PV-WAVE PyIMSL Studio Python real estate ReplayEngine research REST retail scanning & governance security Semantics Manager services SmartRank SOA SOAP software policy software quality software security software verification SOLA source code analysis SourcePro static analysis static code analysis Stingray Studio supply chain support support & services survey results telecom TotalView training transportation video Views Visualization web development white paper Zend Zend case study Zend datasheet Zend Framework Zend Guard Zend Server Zend Studio Zend video Zend white paper Z-Ray