Cookie Warning

This site uses cookies to help improve your experience

Please follow the link to find out more about cookies. Learn more

I understand
 

Events

Join Our Mailing List

Sign up to receive our quarterly newsletter and information about upcoming events and webinars. No sales person will contact you unless you request it, and you can unsubscribe at any time.


Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input
Invalid Input






WebinarsView All

DATE/TIME EVENT NAME & TOPIC DETAILS
11 July 2017
09:00 am - BST
13:30 pm - IST
Protect the Weak Link in Embedded Systems with New MISRA C Security Guidelines

As developers continue to add features to their products within already constrained budgets and schedules, software has become the weak link that allows malicious entities to gain access to sensitive data and take over systems. Even if devices aren’t considered safety-critical, the impact of their data being hacked can be devastating for the user and the manufacturer.

11 July 2017
09:00 am - PDT
12:00 pm - EDT
17:00 pm - BST
Protect the Weak Link in Embedded Systems with New MISRA C Security Guidelines

As developers continue to add features to their products within already constrained budgets and schedules, software has become the weak link that allows malicious entities to gain access to sensitive data and take over systems. Even if devices aren’t considered safety-critical, the impact of their data being hacked can be devastating for the user and the manufacturer.

8 August 2017
09:00 am - BST
13:30 pm - IST
Understand Software Quality’s Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit Testing

The definition of quality code is evolving as demands for it increase. Reliable, safe coding practices have been widely adopted for applications such as medical, industrial, transportation, automotive, and aerospace where a software malfunction could cause injury or death. But current headlines make it clear that secure coding has become equally imperative, and for a much broader range of applications where hacking can result in damaged brands, misused information, and identity theft. While there are many ways to layer security into software, it is also easy to inadvertently introduce flaws that can result in safety or security vulnerabilities.

8 August 2017
09:00 am - PDT
12:00 pm - EDT
17:00 pm - BST
Understand Software Quality’s Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit Testing

The definition of quality code is evolving as demands for it increase. Reliable, safe coding practices have been widely adopted for applications such as medical, industrial, transportation, automotive, and aerospace where a software malfunction could cause injury or death. But current headlines make it clear that secure coding has become equally imperative, and for a much broader range of applications where hacking can result in damaged brands, misused information, and identity theft. While there are many ways to layer security into software, it is also easy to inadvertently introduce flaws that can result in safety or security vulnerabilities.