This week, major US government agencies, including all five branches of the US military, the Pentagon, 425 of the US Fortune500 companies and other organizations across Europe, Asia and the Middle-East, discovered their IT networks had been breached by hackers looking to steal sensitive data (the identity of the intruders is still not clear).
Writing good software is hard. Making it secure is even harder. It requires knowhow, an awareness of common programming flaws and discipline; checking input sizes; managing memory allocation and deallocation; addressing string formatting; avoiding dangling pointers – the list goes on and on. More often than not, writing secure code stands in contrast to developers’ […]
Writing good code is hard. Making it secure is harder. Doing so with 3rd party components is a nightmare. That’s what R&D organizations realize as they embrace software supply chains to speed up innovation and development.
There’s a chart making rounds in the past few years, comparing the software complexity of connected cars to that of an F-35 jet fighter. Apparently, an F-35 includes around 8 million lines, whereas a modern car has around 100,000,000. So are cars more complex than a fighter jet?