BLOG
-
Log4j Taught Us a Valuable Lesson
We need to know what’s in the software that is supporting our business.
-
SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity
The World Forum for Harmonization of Vehicle Regulations (WP.29) of the United Nations Economic Commission for Europe (UNECE) is a global regulatory forum within the UNECE Inland...
-
Software Supply Chain Security Terminology
In light of recent high profile software supply chain security issues such as the SolarWinds attack and the Log4j open source vulnerability, we found it important to identify and explain...
-
Role of SAST and SCA in ISO/SAE 21434 - Road Vehicles Cybersecurity Engineering
As cars become more connected and complex, the amount of software needed is staggering. With 100 million lines of code being standard for current vehicles and up to 300 million for...
-
The Minefields of MISRA Coverage
Modern static application security testing (SAST) tools are typically used for two main purposes: finding bugs, and finding violations of coding standards. The primary purpose of...
-
Accelerating Automotive Software Safety with MISRA C and SAST
The MISRA C/C++ coding guidelines were created based on concerns about the ability to safely use the C and C++ programming languages in critical automotive systems. Since its inception...
-
Introducing MISRA C Coding Standard to an Existing Code Base
The intent of the Motor Industry Software Reliability Association (MISRA) C coding standard was to define a subset of the C language that minimizes the possibilities of errors. Although...
-
Common Software and Application Security Terms Explained
The software security discipline is full of terminology and it’s important to state our particular definitions for these terms in the context of GrammaTech products and our approach to...
-
Calculating the ROI of SAST in DevSecOps for Embedded Software
With the increasing reliance on software driving critical functionality in all types of products such as industrial controls, medical devices, automotive sensors, flight control systems...
-
How To Address Digital Supply Chain Vulnerabilities
Most organizations do everything they can to manage third-party risks associated with their vendors, agents, resellers and partners. However, a couple of supply chain components are...
-
Coming to Security Mandate Near You: SBOMs
The recent executive order will expand what companies must disclose to the government when a data breach occurs. Like the California Consumer Privacy Act (CCPA), these new rules will...
-
A Practical Approach to Shifting Security Left
There are two important considerations when adding security to an existing DevOps pipeline. The first is security in code, which means, when code is developed, the security of the code...
-
TCP/IP stacks vulnerabilities are a wake-up call for embedded software
URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in vetting and auditing software supply chains. The blame doesn’t...
-
As drone adoption soars, expect greater regulation of embedded code
Software safety and security will become more closely scrutinized as the commercial drone industry grows.
-
GrammaTech Releases CodeSonar Version 6.2 Focused on Enabling DevSecOps
Ready for DevSecOps GrammaTech’s CodeSonar static application security testing (SAST) solution already has great integrations with the tools our customers rely on to develop software...
-
Log4j 2 Vulnerability – Practical Advice and What’s Next for Software Supply Chain Security
If you are a cybersecurity or DevOps professional, you have probably had a very hectic 96 hours and probably many more to come. The critical Zero-Day vulnerability (CVE-2021-44228,...
-
Software supply chain exploits are exploding–How to proactively prevent threats
Your software supply chain is increasingly coming under attack - straining your existing cybersecurity measures to detect attacks. Can you exclusively rely on this reactive technology,...
-
GrammaTech IronBank Container for CodeSonar and Wind River VxWorks
The IronBank (also known as the DoD Centralized Artifacts Repository) is a collection of signed container images for both open source and commercial software (COTS). The IronBank...
-
Integrations are Key to Success in DevSecOps for Embedded Development
The term DevSecOps is a contraction of developer, security and operations. Despite the buzzword hype, it does have positive implications for improving the quality, security and...
-
GrammaTech Named a SINET16 Cybersecurity Innovator
Each year, SINET evaluates the technologies and products from all over the world with hundreds of cybersecurity companies being considered. Of these, 16 are chosen for being the most...
-
Loading More...