By Lori Flynn on November 20, 2017 3:42 PM| No Comments
This blog post is also authored by William Klieber. Exfiltration of sensitive data on mobile devices is a major concern for the DoD, other organizations, and individuals. Colluding apps in public use have been discovered by security researchers. The Mobile...
By Lori Flynn on January 23, 2017 9:00 AM| No Comments
Federal agencies and other organizations face an overwhelming security landscape. The arsenal available to these organizations for securing software includes static analysis tools, which search code for flaws, including those that could lead to software vulnerabilities. The sheer effort required...
By Lori Flynn on June 6, 2016 9:00 AM| No Comments
In 2015, the National Vulnerability Database (NVD) recorded 6,488 new software vulnerabilities, and the NVD documents a total of 74,885 software vulnerabilities discovered between 1988-2016. Static analysis tools examine code for flaws, including those that could lead to software security...
By Lori Flynn on March 16, 2015 4:19 PM| No Comments
This blog post was co-authored by Will Klieber. Each software application installed on a mobile smartphone, whether a new app or an update, can introduce new, unintentional vulnerabilities or malicious code. These problems can lead to security challenges for organizations...
By Lori Flynn on March 10, 2014 7:16 PM| No Comments
Although the CERT Secure Coding team has developed secure coding rules and guidelines for Java, prior to 2013 we had not developed a set of secure coding rules that were specific to Java's application in the Android platform. Android is...
Visit the SEI Digital Library for other publications by Lori
Toll Free: 888-201-4479
4500 Fifth Avenue
Pittsburgh, PA 15213-2612