Static program analysis tools

Fortify Software

Fortify Software, later known as Fortify Inc., is a California-based software security vendor, founded in 2003 and acquired by Hewlett-Packard in 2010, Micro Focus in 2017, and OpenText in 2022. Fortify offerings included Static Application Security Testing and Dynamic Application Security Testing products, as well as products and services that support Software Security Assurance. In 2011, Fortify introduced Fortify OnDemand, a static and dynamic application testing service. (Wikipedia).

Fortify Software
Video thumbnail

Open Source vs. Closed Source Software

In this video, you’ll learn more about the differences between open-source software and closed-source software. Visit https://edu.gcfglobal.org/en/basic-computer-skills/ for more technology, software, and computer tips. We hope you enjoy!

From playlist Technology Trends

Video thumbnail

How to use TypeScript in React

TypeScript can be helpful to React developers in a lot of ways. Learn how to use Typescript in React. đź”—Link - create-react-app-typescript : https://github.com/wmonk/create-react-app-typescript Tutorial by Ben Awad. Check out his YouTube channel: https://www.youtube.com/channel/UC-8QAzbLc

From playlist Tutorials

Video thumbnail

How To Create A Speech-To-Text & Text-To-Speech App In C# | Session 01 | #C | #programming

Don’t forget to subscribe! This project series will guide you on how to create a Speech-To-Text & Text-To-Speech App In C#. We are going to create an app that would respond to voice commands and changes speech into text and text into speech with a very easy process. We are going to use

From playlist Create A Speech-To-Text & Text-To-Speech App

Video thumbnail

CERIAS Security: Static source code analysis 1/6

Clip 1/6 Speaker: Jacob West · Fortify Software Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review t

From playlist The CERIAS Security Seminars 2008

Video thumbnail

reactable: basic demo #2

More information about the Reactable instrument: http://www.reactable.com

From playlist Staff Favorites

Video thumbnail

DEFCON 18: Repelling the Wily Insider 1/4

Speakers: Matias Madou, Jacob West Working with more than 50 malicious backdoors written over the last 10 years we show how insiders who write code, whether they are developers working for an enterprise or contributors to an open source project, have an almost unlimited number of ways t

From playlist DEFCON 18-3

Video thumbnail

How To Create A Speech-To-Text & Text-To-Speech App In C# | Session 04 | #C | #programming

Don’t forget to subscribe! This project series will guide you on how to create a Speech-To-Text & Text-To-Speech App In C#. We are going to create an app that would respond to voice commands and changes speech into text and text into speech with a very easy process. We are going to use

From playlist Create A Speech-To-Text & Text-To-Speech App

Video thumbnail

How To Create A Speech-To-Text & Text-To-Speech App In C# | Introduction | #C | #programming

Don’t forget to subscribe! This project series will guide you on how to create a Speech-To-Text & Text-To-Speech App In C#. We are going to create an app that would respond to voice commands and changes speech into text and text into speech with a very easy process. We are going to use

From playlist Create A Speech-To-Text & Text-To-Speech App

Video thumbnail

CERIAS Security: Static source code analysis 5/6

Clip 5/6 Speaker: Jacob West · Fortify Software Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review t

From playlist The CERIAS Security Seminars 2008

Video thumbnail

OWASP AppSecUSA 2011: Secure Programming Support in IDE

Speakers: Dr. Bill Chu, Jing Xie Many of today's application security vulnerabilities are introduced by software developers writing insecure code. The OWASP community has already reached a consensus that developers do not write secure code for all kinds of reasons. We believe a lack of un

From playlist OWASP AppSecUSA 2011

Video thumbnail

SOURCE Boston 2008: The CERT C++ Secure Coding Standard

Speaker: Stephen C. Dewhurst - Co-Founder and President of Semantics Consulting, Inc. An essential element of secure coding is a well documented and enforceable coding standard. Coding standards encourage programmers to follow a uniform set of rules and guidelines determined by the requir

From playlist SOURCE Boston 2008

Video thumbnail

How To Create A Speech-To-Text & Text-To-Speech App In C# | Session 05 | #C | #programming

Don’t forget to subscribe! This project series will guide you on how to create a Speech-To-Text & Text-To-Speech App In C#. We are going to create an app that would respond to voice commands and changes speech into text and text into speech with a very easy process. We are going to use

From playlist Create A Speech-To-Text & Text-To-Speech App

Video thumbnail

OWASP FROC 2010: Watching Software Run Beyond Defect Elimination 1/4

Clip 1/4 Speaker: Brian Chess, Ph.D. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting netw

From playlist OWASP FROC 2010

Video thumbnail

An introduction to WebAssembly

Want to write a web application? Better get familiar with JavaScript. JavaScript has long been the king of front-end. While there have been various attempts to dethrone it, they have typically involved treating JavaScript as an assembly-language analog that you transpile your code to. This

From playlist WebAssembly

Video thumbnail

How To Create A Speech-To-Text & Text-To-Speech App In C# | Session 03 | #C | #programming

Don’t forget to subscribe! This project series will guide you on how to create a Speech-To-Text & Text-To-Speech App In C#. We are going to create an app that would respond to voice commands and changes speech into text and text into speech with a very easy process. We are going to use

From playlist Create A Speech-To-Text & Text-To-Speech App

Video thumbnail

DEFCON 19: Seven Ways to Hang Yourself with Google Android

Speakers: Yekaterina Tsipenyuk O'Neil Principal Security Researcher, HP Fortify Software | Erika Chin Ph.D. Student, UC Berkeley According to Google, Android was designed to give mobile developers "an excellent software platform for everyday users" on which to build rich applications for

From playlist DEFCON 19

Video thumbnail

CERIAS Security: Static source code analysis 4/6

Clip 4/6 Speaker: Jacob West · Fortify Software Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review t

From playlist The CERIAS Security Seminars 2008

Video thumbnail

Cyber Defense Weekly webcast 20-8-2010

Weekly news and analysis of cyberwar and cyber defense Presenter: Richard Stiennon Resilient security architectures, Indian hacktivism, HP acquires Fortify For more information click here; http://bit.ly/cCIUv8 Source: Brighttalk.com

From playlist Cyber Defense Weekly webcast

Video thumbnail

How to Work with Wikipedia Sandbox

This is a short video that helps students or editors of Wikipedia to access and edit in the Sandbox of their user account. This was made for the Wiki Edu Project. I do not own or hold copyright over any aspect of the Wikipedia site or its pages. ***There is no audio***

From playlist Wikipedia Education Dashboard Tutorials

Video thumbnail

OWASP AppSecUSA 2012: Using Interactive Static Analysis for Detection of Software Vulnerabilities

Speaker: Bill Chu We present our work of using interactive static analysis to improve upon static analysis techniques by introducing a new mixed-initiative paradigm for interacting with developers to aid in the detection and prevention of security vulnerabilities. The key difference betwe

From playlist OWASP AppSecUSA 2012

Related pages

List of tools for static code analysis