How to mitigate software supply-chain risk

November 16, 2016

How to mitigate software supply-chain risk

Previously trusted legacy code, commercial third-party code, and open-source code is often leveraged in the development of Internet of Things (IoT) ap...

Previously trusted legacy code, commercial third-party code, and open-source code is often leveraged in the development of Internet of Things (IoT) applications as a money- and time-saving measure, but without a thorough security audit process, this leveraged code might bring security risks along with it.

On Thursday, November 17 at 11 a.m. ET, Embedded University will conclude the three-class series with the topic, “Mitigate the Software Supply-Chain Risk.” This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will cover binary static analysis technologies for efficiently assessing risk and testing the code of specific target hardware. These analysis tools and techniques will help developers ensure the quality, safety, and security of products before deployment so they can be trusted throughout it.

To register for this class, visit http://bit.ly/2eTWWSc.

Jamie Leland, Content Assistant
Categories
IoT