Quantcast
Channel: Dr. Dobb's Security
Browsing latest articles
Browse All 23 View Live

Rogue Wave Tackles Software Risk Mitigation

Analysis toolchain for deep software risk assessment and mitigation

View Article



Hybrid Version Control Across Git and Perforce

Combo solution still looks after security and agility needs of enterprise DevOps

View Article

Atego Vantage's Triple Model Combination

Solution for iterative and common product development

View Article

Java SE 8 Beyond Lambdas: The Big Picture

In addition to Lambdas, Java 8 features changes to the way annotations are handled, array processing, VM size, garbage collection, and so much more.

View Article

SUSE kGraft Live Patches Linux Kernel

Company pledges to submit kGraft upstream for standard live patching solution

View Article


CMMI Extends Framework For Security

Verification and validation updates feature in CMMI for Development V1.3

View Article

Free Microsoft Threat Modeling Tool 2014

A systematic way to find design-level security and privacy weaknesses in systems

View Article

After Heartbleed: A Look at Languages that Support Provability

The open-source SPARK 2014 language can prove that code correctly matches specs. This capability closes off vulnerabilities and illuminates logic errors in code.

View Article


Enterprise Java Development For Internet of Things

IoT-Ready Kaazing Gateway 4.0 JMS Edition

View Article


Developer Reading List

The best summer reads.

View Article

Oracle Mobile Application Framework Arrives

Mobile-centric integration for back end services and security

View Article

Dovecot Gmail API Compatible REST API

Open source and complementary to existing email IMAP and POP3 protocols

View Article

CRC: The C Stands for Confusion

Because it is so often abstracted, people don't always make smart choices about selecting and specifying CRCs.

View Article


Tooling Up for the Marriage of the Internet of Things, Big Data, and Cloud...

Finding tools that will bridge IoT, machine-to-machine, and big data is no simple task. But some integrated solutions are beginning to appear.

View Article

Security Issues in Swift: What the New Language Did Not Fix

The security issues that existed in Objective-C have been only partially addressed in Swift. What to watch out for?

View Article


The Internet of Overhyped Things

Vendors and analysts would have us believe that the Internet of Things is imminent. But, in fact, it will be years before the obstacles it faces can be surmounted.

View Article

IEEE: Top Ten Software Security Design Flaws

The IEEE Center for Secure Design cybersecurity initiative has released a report titled "Avoiding the Top 10 Software Security Design Flaws"

View Article


Jolt Awards: The Best Books

The best books of the past 12 months.

View Article

Scanning Critical Security Defects In C# Open Source

OWASP and C# capabilities in scan service expanded

View Article

5 Steps to Protect Mobile Apps from Attacks

Mobile apps are important gateways to malicious attacks, just like Web apps. It's high time to begin thinking about mobile security as a top development priority. Where to begin?

View Article

Free Microsoft Threat Modeling Tool 2014

A systematic way to find design-level security and privacy weaknesses in systems

View Article


Okta Identity Management Selection Pack For Developers

Ingredients: secure authentication, single sign-on, multi-factor authentication — may contain nuts

View Article


Dr. Dobb's Archive

On this site is archived all the content from Dr. Dobb's that was published on the Web through December 31, 2014.

View Article
Browsing latest articles
Browse All 23 View Live


Latest Images