Articles with tag 'Security'

The third part of a blog series, discussing HSM-backed security requirements and how we analyse the tradeoffs offered by modern options.

The 2nd part of a blog series, discussing HSM-backed security requirements and how we analyze the tradeoffs offered by modern options.

As we work increasingly with systems that have HSM-backed security requirements, we analyze the tradeoffs offered by modern options.

In an evermore software-intensive world, the security of software systems has become a critical part of product design and implementation. One way in which attackers exploit software systems is by crafting malicious inputs. The defence to such attacks is a combination of defensive programming techniques including input validation.

As concerns about the privacy and security implications of contract tracing apps for COVID-19 show, establishing trust in software is still a real challenge. I’ve been following reports about these apps closely, and have been interested to read medical, technical and ethical analysis from around the world. What all of these perspectives underline for me is the critical role of public trust in the success or failure of such applications.
LONDON--(BUSINESS WIRE)-- The Institute for Strategy, Resilience & Security (ISRS) at University College London (UCL) in association with software developer Codethink Ltd, today announced the release of a new white paper entitled Towards Trustable Software – A Systematic Approach To Establishing Trust In Software. Paul Sherwood, CEO of Codethink will introduce …
Tag Index
- Aarch64 (2)
- ABI Stability (1)
- Advent of Code (1)
- AGL (1)
- AI/ML (1)
- algorithm (2)
- Almeria (1)
- Android Automotive (1)
- ansible (1)
- API (1)
- AppliedMicro (1)
- Architecture (2)
- Arm (1)
- ARMv8-A (1)
- ASIL D (1)
- Atomic Upgrades (1)
- audio (2)
- automation (2)
- Automotive (11)
- Automotive Grade Linux (1)
- Autonomous vehicle (1)
- awards (1)
- Azure (2)
- Baserock (6)
- Bazel (5)
- Bazelize (2)
- benchmarking (1)
- Bloodlight (3)
- board (1)
- board support package (1)
- british cycling (1)
- BSP (1)
- Bugs (1)
- build (3)
- Build Engineering (16)
- build systems (1)
- build tools (1)
- Buildbarn (2)
- BuildBox (4)
- buildfarm (1)
- BuildGrid (5)
- buildroot (3)
- BuildStream (12)
- C (2)
- Case Design (1)
- CD (2)
- Celduin (1)
- Certificate (1)
- Chrome (1)
- CI (3)
- CICD (11)
- CIP (3)
- civil infrastructure (1)
- cli (1)
- Cloud (1)
- Cloud-native (1)
- cmake (2)
- CNN (1)
- Code Review (1)
- coding puzzle (1)
- community (2)
- Company Statement (1)
- compiler (1)
- compilers (3)
- Concourse (1)
- Conference (6)
- Conferences (3)
- configuration (1)
- continuous delivery (2)
- continuous integration (1)
- contribution (1)
- Coronavirus (4)
- cost (1)
- Culture (4)
- data (2)
- Databricks (1)
- Datacentred (1)
- DebConf (1)
- Debian (1)
- debugging (3)
- deep learning (1)
- defensive programming (1)
- dependencies (1)
- deterministic (1)
- Devices (1)
- DevOps (2)
- Distributed Builds (2)
- Diversity (2)
- Drivers (1)
- Eagle (1)
- ELCE (1)
- Electric vehicle (1)
- electronics (2)
- Embedded (7)
- End-User Black-Box Testing (1)
- erasure codes (1)
- error correction (1)
- events (4)
- Exida (1)
- firmware (4)
- flathub (1)
- flatpak (3)
- FLOSS (1)
- Fortran (2)
- FOSDEM (8)
- FOSS (38)
- FOSS Backstage (1)
- FOSS community (2)
- FPGA (2)
- Freedesktop SDK (5)
- funny (1)
- GENIVI (3)
- Git (3)
- GitHub (1)
- Gitlab (1)
- GitOps (1)
- GNOME (12)
- GNOME OS (4)
- GStreamer (1)
- GUADEC (3)
- GUI (1)
- Hamsa (1)
- Hardware (10)
- Hardware Testing (1)
- heart monitor (1)
- heart rate sensor (1)
- Holidays (1)
- HPC (1)
- HR (2)
- hypervisor (1)
- Icicle (1)
- Icicle-Kit (1)
- idempotent (1)
- IEC 61508 (1)
- In-vehicle (1)
- inclusivity (1)
- infotainment (1)
- infrastructure (2)
- Input validation (1)
- international womens day (1)
- Internship (1)
- Interrogizer (1)
- interview (4)
- IoT (1)
- ISO 26262 (1)
- ISRS (1)
- IVI (1)
- Jeeeun Evans (1)
- Jetson (1)
- join (1)
- Jsonnet (1)
- kernel (12)
- kernel maintenance (1)
- Kicad (2)
- latency (1)
- Lava (1)
- legacy fortran (1)
- libabigail (1)
- Linux (22)
- Linux Foundation (4)
- Linux kernel (2)
- LLVM (1)
- Long-term Maintainability (24)
- long term maintenance (1)
- Long Term Support (1)
- Lorry (4)
- LTTng (1)
- Machine Learning (3)
- mainline (2)
- maintenance (1)
- masterclass (1)
- Medical (1)
- medical device (3)
- Medical Devices (3)
- meetup (2)
- MEG Project (1)
- membership (1)
- Microchip (1)
- Microcontroller (5)
- mirroring (3)
- Mobile (1)
- Multicamera (1)
- NVIDIA (3)
- onboarding (1)
- Open Hardware (1)
- Open Source (67)
- open source project (1)
- Open Source Summit (1)
- opencontrol (1)
- OpenQA (1)
- OpenSCAD (1)
- opensource (1)
- OpenStack (3)
- parity (1)
- Partnership (3)
- PCB (1)
- performance (4)
- PinePhone (1)
- plethysmography (1)
- PM (1)
- process (1)
- productivity (2)
- Programming (2)
- Project Manager (2)
- pulse oximeter (1)
- PyCon (1)
- Python (4)
- QEMU (1)
- qnx (1)
- RAAPI (1)
- real-time (1)
- REAPI (2)
- recc (1)
- Remote Asset (1)
- Remote Execution (5)
- Remote Working (1)
- remove-caching (1)
- reproducibility (1)
- Research (2)
- RHEL (1)
- RISC-V (12)
- Robotics (1)
- rolling release (1)
- Runtime (1)
- Rust (3)
- Safety (17)
- safety-critical (1)
- safety engineering (1)
- Safety System (3)
- scheduling (1)
- schemas (2)
- Security (6)
- Server (1)
- SiFive (1)
- software (2)
- Software Build Times (1)
- software engineering (1)
- Software-Intensive Systems (1)
- software modernisation (1)
- source mirroring (1)
- sponsorship (1)
- sport (1)
- Staff (1)
- STAMP (2)
- standups (1)
- STM32 (2)
- storage (1)
- storyboard (1)
- STPA (8)
- supply chain (1)
- systemd (1)
- task tracker (1)
- team leaders (1)
- Team Management (1)
- Tegra (1)
- telematics (1)
- Terraform (1)
- testimonial (1)
- testing (9)
- Teufel (2)
- TK1 (1)
- tool (1)
- toolchain (3)
- top (1)
- trace (1)
- traceability (1)
- Tracking (1)
- troubleshooting (3)
- Trustable Software (11)
- TX2 (1)
- U-Boot (1)
- upstream (6)
- USB (1)
- USB3 (1)
- User Group (1)
- User-space (1)
- validation (2)
- Vector Cryptography (1)
- Visteon (1)
- visualisation (1)
- Walking (1)
- websockets (1)
- Wellbeing (1)
- women in tech (1)
- women in technology (1)
- women's day (1)
- X-Gene (1)
- Xmas (2)
- XML (1)
- yaml (2)
- Yocto (1)
- YOLO (1)