با برنامه Player FM !
Secure Software Development Landscape
Manage episode 161344184 series 1264075
Last summer's Wired article describing vulnerabilities in the Jeep shows that software is being created and deployed with exploitable, yet avoidable, security flaws. So far, the automotive attacks have been largely demonstrations. However, successful cyber-attacks have been carried out on steel furnaces in Germany and the electrical grid in Ukraine. Insecurely written software in cyber-physical systems places people and property in jeopardy. Fortunately, there are many techniques available to those building software for cyber physical systems that can greatly reduce their vulnerability. This talk starts with an in-depth review of the Jeep scenario. It then examines how security can be introduced throughout the software development lifecycle to blunt such vulnerabilities.
168 قسمت
Manage episode 161344184 series 1264075
Last summer's Wired article describing vulnerabilities in the Jeep shows that software is being created and deployed with exploitable, yet avoidable, security flaws. So far, the automotive attacks have been largely demonstrations. However, successful cyber-attacks have been carried out on steel furnaces in Germany and the electrical grid in Ukraine. Insecurely written software in cyber-physical systems places people and property in jeopardy. Fortunately, there are many techniques available to those building software for cyber physical systems that can greatly reduce their vulnerability. This talk starts with an in-depth review of the Jeep scenario. It then examines how security can be introduced throughout the software development lifecycle to blunt such vulnerabilities.
168 قسمت
All episodes
×
1 Model Your Way to Better Cybersecurity 1:02:54

1 DevSecOps: See, Use, Succeed 1:00:41

1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23

1 A New Performance Zone for Software for National Security 1:02:23


1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05


1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22


1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10


1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03


به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.