How to mitigate software supply-chain risk

November 16, 2016 OpenSystems Media

Previously trusted legacy code, commercial third-party code, and open-source code is often leveraged in the development of Internet of Things (IoT) applications as a money- and time-saving measure, but without a thorough security audit process, this leveraged code might bring security risks along with it.

On Thursday, November 17 at 11 a.m. ET, Embedded University will conclude the three-class series with the topic, “Mitigate the Software Supply-Chain Risk.” This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will cover binary static analysis technologies for efficiently assessing risk and testing the code of specific target hardware. These analysis tools and techniques will help developers ensure the quality, safety, and security of products before deployment so they can be trusted throughout it.

To register for this class, visit http://bit.ly/2eTWWSc.

Jamie Leland, Content Assistant
Previous Article
How taint analysis can reveal vulnerable code and protect IoT devices from cyber attack

Unfamiliar with taint analysis? It's the practice of discovering vulnerabilities in application code and sy...

Next Article
Manage and update your vehicle fleet remotely and (more importantly) securely

If I had to pick one technology that got more than its share of attention at CES, it would be automotive. T...

×

Stay updated on security-related design topics with the security edition of our Embedded Daily newsletter.

Subscribed! Look for 1st copy soon.
Error - something went wrong!