How to mitigate software supply-chain risk

November 16, 2016 OpenSystems Media

Previously trusted legacy code, commercial third-party code, and open-source code is often leveraged in the development of Internet of Things (IoT) applications as a money- and time-saving measure, but without a thorough security audit process, this leveraged code might bring security risks along with it.

On Thursday, November 17 at 11 a.m. ET, Embedded University will conclude the three-class series with the topic, “Mitigate the Software Supply-Chain Risk.” This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will cover binary static analysis technologies for efficiently assessing risk and testing the code of specific target hardware. These analysis tools and techniques will help developers ensure the quality, safety, and security of products before deployment so they can be trusted throughout it.

To register for this class, visit http://bit.ly/2eTWWSc.

Jamie Leland, Content Assistant
Previous Article
Avoiding resource drain from antivirus software

The modus operandi of enterprise antivirus solutions involves watching with an eagle eye in the background,...

Next Article
CES 2017: V2X envelops CES with help from AT&T, Delphi, Savari

Some notable companies were absent from the North Hall of the Las Vegas Convention Center where automotive ...

×

Stay updated on Developer Tools & Operating Systems with the Dev Tools and OS edition of our Embedded Daily newsletter

Subscribed! Look for 1st copy soon.
Error - something went wrong!