Analysing Security focussing on the Common Weakness Enumeration CWE {On-demand webinar}
Are you doing everything possible to ensure security issues are identified and addressed? Did you know that Axivion’s static code analysis can support your security goals? What is the common weakness enumeration (CWE) and how does it differ from rulesets such as MISRA and Cert? Join our webinar to find out. As the consequences of cyber-attacks are becoming increasingly severe, ensuring security has become a necessity across all industries. The common weakness enumeration (CWE) can be used as the foundation for the security analysis of software. As CWE lists possible issues rather than providing guidelines to follow, it provides for a broad scope of use cases - ranging from safety-critical embedded devices to user interfaces. However, in order to apply CWE correctly, additional steps are required to ensure optimal usage.
Oh, here is more
Webinar: Transforming Industrial Vehicles through Technology and Innovation
In this webinar, experts from Qt Group, Novatron, Infineon, and Calm Tech Institute come together to...
Watch videoWebinar: The Cost of Code - Understanding and Overcoming Technical Debt
Are you struggling with technical debt (also known as software erosion) or are curious about how it ...
Watch videoWebinar: Innovative GUI Solution for Resource-Limited Embedded System
In this session learn how to overcome the traditional issues related to graphical user interface (GU...
Watch videoWebinar: Safe and Effective Medical Devices Built with MCUs
Ever wondered about medical devices built with microcontrollers (MCUs), especially in today's world ...
Watch video