How to mitigate software supply-chain risk

November 16, 2016 OpenSystems Media

Previously trusted legacy code, commercial third-party code, and open-source code is often leveraged in the development of Internet of Things (IoT) applications as a money- and time-saving measure, but without a thorough security audit process, this leveraged code might bring security risks along with it.

On Thursday, November 17 at 11 a.m. ET, Embedded University will conclude the three-class series with the topic, “Mitigate the Software Supply-Chain Risk.” This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will cover binary static analysis technologies for efficiently assessing risk and testing the code of specific target hardware. These analysis tools and techniques will help developers ensure the quality, safety, and security of products before deployment so they can be trusted throughout it.

To register for this class, visit http://bit.ly/2eTWWSc.

Jamie Leland, Content Assistant
Previous Article
How taint analysis can reveal vulnerable code and protect IoT devices from cyber attack

Unfamiliar with taint analysis? It's the practice of discovering vulnerabilities in application code and sy...

Next Article
CES 2017: Bosch XDK turns sensors into solutions

Why do I go to CES every year? That's a question I'm sometimes asked by technologists in the embedded space...