How To Improve Security and Perform Security Audits

  • Prevent Cybercrime and Insider Attacks in Your Company with Static Analysis

    Prevent Cybercrime and Insider Attacks in Your Company with Static Analysis

    Read the document
  • Thwarting Insider Attacks with Advanced Static Analysis

    Thwarting Insider Attacks with Advanced Static Analysis

    INTRODUCTION: The security threat posed by insiders is often underestimated. According to an IBM study, 32% of attackers are insiders and 24% are “inadvertent actors” (e.g. people...

    Read Article
  • GrammaTech Cyber Hardening Services

    GrammaTech Cyber Hardening Services

    Read the document
  • GrammaTech CodeSonar for Binary Code

    GrammaTech CodeSonar for Binary Code

    Beyond Static Source Analysis

    Read Article
  • Thwarting Insider Attacks with Advanced Static Analysis

    Thwarting Insider Attacks with Advanced Static Analysis

    INTRODUCTION: The security threat posed by insiders is often underestimated. According to an IBM study, 32% of attackers are insiders and 24% are “inadvertent actors” (e.g. people...

    Read Article
  • VDC Research Highlights Cybersecurity Concerns in Industry 4.0

    VDC Research Highlights Cybersecurity Concerns in Industry 4.0

    Security concerns should guide decisions from the earliest stages through the full software development lifecycle in order to safeguard the Industry 4.0 architecture.

    Read Article
  • Advanced Static Analysis for C/C++

    Advanced Static Analysis for C/C++

    Read the document
  • Enhancing Code Reviews with Static Analysis

    Enhancing Code Reviews with Static Analysis

    INTRODUCTION: Code reviews (or inspections) are an effective way to reduce defects in software projects. In fact, defect removal rate can be as high as 75%, meaning two thirds of all...

    Read Article
  • The Economics of Static Analysis Tool Usage

    The Economics of Static Analysis Tool Usage

    INTRODUCTION: The most effective tool is one that reports a good number of true positives, without too many false negatives, without consuming too much compute...

    Read Article
  • Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Read the document
  • Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Read the document
  • Addressing IoT's Impact on Software Engineering

    Addressing IoT's Impact on Software Engineering

    Read the document
  • A Four-Step Guide to Security Assurance for IoT Devices

    A Four-Step Guide to Security Assurance for IoT Devices

    Read the document
  • VDC finds IoT fueling faster software development but with greater requirements for security protection

    VDC finds IoT fueling faster software development but with greater requirements for security protection

    INTRODUCTION: VDC’s recent report “Software Assembly Practices Necessitate More Precautions” highlights a significant software challenge for IoT device manufacturers. A majority of...

    Read Article
  • What is Taint Checking?

    What is Taint Checking?

    Taint checking? This isn't a trap, I promise. It sounds vulgar, but its etymology is perfectly reasonable, stemming from the notion that data that has been "tainted" by a...

    Read Article
  • The Human Internet of Things (HIoT)

    The Human Internet of Things (HIoT)

    Being in the marketing department at a cyber-security research firm, I'm often struck by how little the average person worries about cyber security. Friends and strangers who ask me...

    Read Article
  • Using Static Analysis to Improve IIoT Device Security

    Using Static Analysis to Improve IIoT Device Security

    INTRODUCTION: The Industrial Internet of Things is unique in that devices that compose industrial control systems are often insecure due to limitations in their design and capability....

    Read Article
  • Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

    Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

    INTRODUCTION: The Internet of Things is coming to industrial systems in a big way (the “IIOT”). But IIOT isn't just IOT with an extra 'I' -- industrial systems differ greatly in...

    Read Article
  • How Vulnerable Are You?

    How Vulnerable Are You?

    INTRODUCTION: The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?" Security is a top-of-mind concern, so we are also frequently...

    Read Article
  • CodeSonar's Visual Tainted Data Analysis2:32

    CodeSonar's Visual Tainted Data Analysis

    CodeSonar's tainted dataflow analysis allows you to explore potentially dangerous data flows in a clear, visual way.

    Watch Video
  • loading
    Loading More...