Secure Software Development Landscape

Carnegie Mellon University

Last summer's Wired article describing vulnerabilities in the Jeep shows that software is being created and deployed with exploitable, yet avoidable, security flaws. So far, the automotive attacks have been largely demonstrations. However, successful cyber-attacks have been carried out on steel furnaces in Germany and the electrical grid in Ukraine. Insecurely written software in cyber-physical systems places people and property in jeopardy. Fortunately, there are many techniques available to those building software for cyber physical systems that can greatly reduce their vulnerability. This talk starts with an in-depth review of the Jeep scenario. It then examines how security can be introduced throughout the software development lifecycle to blunt such vulnerabilities.
Watch Now

Spotlight

The AWS Cloud is architected with security as the highest priority. Security is designed into multiple layers of the AWS environment with a data center and network architecture built to help protect even the most security sensitive organizations. AWS takes responsibility for security of the cloud while organizations, on the other hand, are responsible for their security configuration in the cloud. With this approach organizations are able to implement the security configuration that is best for them.


OTHER ON-DEMAND WEBINARS

Make IT a Service Provider

Info-Tech Research Group

Traditionally, IT service management models are focused around “Technology” – which leads to: Lack of communication between the business and end users. Redundant services and increased costs. Poor business perception of IT. Misaligned level and quality of service.
Watch Now

Addressing Code Quality

SmartBear Software

In this webinar, Mark Hammer (Senior Product Director of Collaborator) will discuss with Andrew Park (Vice President of Engineering, G3 Technologies) how developers can address the issue of quality – before the product gets to QA and especially before it gets to the customer. Reflecting on his years of experience in building top development teams, Park will explain the processes and tools he uses to achieve high quality — and how they can save companies money in reworks and fixes.
Watch Now

How Cloud Management and SDN Killed the Traditional Enterprise LAN

Tallac Networks

A colleague of mine recently mashed up a famous R.E.M song for his blog. He reworked the famous lyrics to say, “It’s the end of the LAN as we know it… And I feel fine”. He couldn’t have been more spot on. As IT resources continue to move to the cloud, traditional infrastructure and the processes associated with running it are literally going out the window. One of the last IT resources to still make the migration to the cloud is the Enterprise LAN. However, since everything else is moving to the cloud, the way we use our LAN is changing. The actual critical IT resources still on the LAN have changed. Cloud management and Software Defined Networking are making it possible to radically simplify your Enterprise LAN – perhaps to the point where you can pay someone else to operate it.
Watch Now

EMC Webcast Program 4U: Go Anywhere. More for less with EMC VNX.

Need to update your storage solution? Now is the time to consider a different approach. Access the webcast of EMC 4U program on storage family EMC VNX designed for efficiency and ease of storage and transform your business in terms of performance, simplicity and costs.
Watch Now

Spotlight

The AWS Cloud is architected with security as the highest priority. Security is designed into multiple layers of the AWS environment with a data center and network architecture built to help protect even the most security sensitive organizations. AWS takes responsibility for security of the cloud while organizations, on the other hand, are responsible for their security configuration in the cloud. With this approach organizations are able to implement the security configuration that is best for them.

resources