How To Improve Security and Perform Security Audits

  • Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Read the document
  • Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Read the document
  • Addressing IoT's Impact on Software Engineering

    Addressing IoT's Impact on Software Engineering

    Read the document
  • A Four-Step Guide to Security Assurance for IoT Devices

    A Four-Step Guide to Security Assurance for IoT Devices

    Read the document
  • VDC finds IoT fueling faster software development but with greater requirements for security protection

    VDC finds IoT fueling faster software development but with greater requirements for security protection

    INTRODUCTION: VDC’s recent report “Software Assembly Practices Necessitate More Precautions” highlights a significant software challenge for IoT device manufacturers. A majority of...

    Read Article
  • What is Taint Checking?

    What is Taint Checking?

    Taint checking? This isn't a trap, I promise. It sounds vulgar, but its etymology is perfectly reasonable, stemming from the notion that data that has been "tainted" by a...

    Read Article
  • The Human Internet of Things (HIoT)

    The Human Internet of Things (HIoT)

    Being in the marketing department at a cyber-security research firm, I'm often struck by how little the average person worries about cyber security. Friends and strangers who ask me...

    Read Article
  • Using Static Analysis to Improve IIoT Device Security

    Using Static Analysis to Improve IIoT Device Security

    INTRODUCTION: The Industrial Internet of Things is unique in that devices that compose industrial control systems are often insecure due to limitations in their design and capability....

    Read Article
  • Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

    Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

    INTRODUCTION: The Internet of Things is coming to industrial systems in a big way (the “IIOT”). But IIOT isn't just IOT with an extra 'I' -- industrial systems differ greatly in...

    Read Article
  • An Interview with GrammaTech's David Hauck2:14

    An Interview with GrammaTech's David Hauck

    David Hauck discusses cyber security and the immense impact of the Internet of Things (IoT).

    Watch Video
  • How Vulnerable Are You?

    How Vulnerable Are You?

    INTRODUCTION: The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?" Security is a top-of-mind concern, so we are also frequently...

    Read Article
  • CodeSonar's Visual Tainted Data Analysis2:32

    CodeSonar's Visual Tainted Data Analysis

    CodeSonar's tainted dataflow analysis allows you to explore potentially dangerous data flows in a clear, visual way.

    Watch Video
  • An Ounce of Prevention: Software hardening for securing IoT devices

    An Ounce of Prevention: Software hardening for securing IoT devices

    INTRODUCTION: Every IoT and embedded device manufacturer endeavors to field secure and safe products. However, even with the robust development processes, it's difficult to ensure...

    Read Article
  • How Software Quality Threatens the Success of the Internet of Things

    How Software Quality Threatens the Success of the Internet of Things

    The Nest is a highly innovative, electronic smart home thermostat manufactured by Alphabet (formerly Google). It is by all accounts a well-designed device, replacing a traditional home thermostat...

    Read Article
  • Don't leave your device software open to failure2:25

    Don't leave your device software open to failure

    Learn about GrammaTech's advanced technologies, services, and software-assurance solutions on the cutting edge of IoT.

    Watch Video
  • Step Four: Security Assurance for IoT Devices - Assessing third party code

    INTRODUCTION:

    Read Article
  • Step Three: Security Assurance for IoT Devices - Leverage Automated Tools

    Step Three: Security Assurance for IoT Devices - Leverage Automated Tools

    INTRODUCTION: For IoT and M2M device security assurance, it's critical to introduce automated software development tools into the development lifecycle. Although software tools' roles...

    Read Article
  • Step Two: Security Assurance for IoT Devices - Threat Assessment and Analysis

    Step Two: Security Assurance for IoT Devices - Threat Assessment and Analysis

    INTRODUCTION: A key ingredient to a security-first design approach is an end-to-end threat assessment and analysis. Your device is part of a larger IoT infrastructure, so understanding...

    Read Article
  • Step One: Security Assurance for IoT Devices - Security First Design

    Step One: Security Assurance for IoT Devices - Security First Design

    INTRODUCTION: The Stuxnet malware was a wake-up call for embedded device security when it became public knowledge in 2010.  Its sophistication and purpose made it clear that industrial control...

    Read Article
  • A Four-Step Guide to Security Assurance for IoT Devices

    A Four-Step Guide to Security Assurance for IoT Devices

    INTRODUCTION: Powered by the forces of the cloud, connected endpoints, wireless technologies, and big data, the Internet of Things (IoT) and machine to machine (M2M) evolution is forming a...

    Read Article
  • loading
    Loading More...