The Motor Industry Software Reliability Association (MISRA) is an organization whose mandate is “to provide assistance to the automotive industry in the application and creation within vehicle systems of safe and reliable software.” MISRAa��s steering committee steering is made up of a mixture of automotive manufactures, such as Ford and Jaguar, component suppliers as well
Tag: static code analysis
To start the discussion on why a Secure SDLC is more important now than ever, we need to take a look at the evolution in applications and how theya��re being secured. Both applications and the way organizations are tasked with securing them have changed dramatically over the past few decades.
Static code review, as a phrase, is actually a bit misleading. Static code review refers to two divergent methods of security testing: static code analyis and code review. These methods check code for flaws, security issues and quality concerns that, when combined, help developers ensure that their code is not only free from potential exploits
Application security is finally beginning to hit the mainstream, and organizations are beginning to see the benefit and need of securing their applications, both internal and external. With so many facets to AppSec, it can be hard to know where to start, especially when trying to build a program from scratch.
YouA�have finally decided to fight cybercrime and protect your application. Great. But picking correctlyA�from the wide range of static code analysis tools available on today’s market has become aA�challenging task. Besides beingA�ineffective in locating application layer vulnerabilities, picking the wrong solution can lead to developer disengagement, which is the worst thing that can happen to
With Google officially dropping Flash ad support in favor of HTML5, the security aspect of this relatively young programming and scripting language has become extremely crucial. Being a web-based application always invites cybercrime, which means that code integrity is very important. The following article will lay down the most important Application Program Interface (API) coding
With more and more high-profile hackings taking place in recent years, application security has become the call of the hour. But while the awareness is on the rise, not all security officers and developers know what exactly needs to be secured. One aspect that is often overlooked during development is application layer security. The following
The modern metropolitan is becoming more and more computerized. Mega computers are running the show in more ways that can be comprehended a�� traffic signals, electricity networks, water supply pipes, public transport services and other civil utilities. While the Smart City conceptA�is improving the standards of urban services, how safe really is it for us?
Gone are the days when people frequented their banks to get their errands done. With more and more banking activities being performed online via web and mobile applications, the security risks are rising exponentially. But are banks and financial institutions doing enough to safeguard our privacy and financial assets? What are the risks and what
Online e-commerce has become the rage. Millions of people worldwide are doing their shopping on the variousA�online platforms. But even enormous e-commerce platforms like eBay areA�not immune to cybercrime, as security researcher MLT demonstrated recently. The culprit this time was Cross Site Scripting (XSS), a common application layer vulnerability that obviously was not detected/remediated during