Coveros CTO Tom Stiehm dives into how to build secure applications successfully. Building Secure Applications
Insight and analysis from thought leaders in agile development and testing, DevOps, security, test automation, and more.
Coveros CTO Tom Stiehm dives into how to build secure applications successfully. Building Secure Applications
By Lisa Morgan Reposted from SD Times Being agile is more critical than ever as businesses compete for customers. The true level of agility can vary greatly from company to company, team to team, department to department and person to person. As organizations scale agile out from pilots and small groups to critical projects involving […]
I needed a quantifiable test that can measure svn performance during a check out. This script take 2 arguments, number of checkouts and parallelism. For example, if I want to run 100 checkout 2 at a time ./load.sh 100 2 or 100 checkouts 50 at a time ./load.sh 100 50 #!/bin/bash i=0; url=”<a href=”http://mysvnrepo” while”>http://mysvnrepo” while</a> [ $i -lt $1 ]; do […]
Fuzz testing or Fuzzing, a technique originated in 1988 by Professor Barton Miller at the University of Wisconsin, is a software testing technique where invalid, unexpected, and or random data is input into the system at various levels in an effort to uncover unexpected system behaviors and system failures including system crashes, failing code assertions, […]
Coveros Labs recently received funding from the Defense Advanced Research Projects Agency (DARPA) through the Active Authentication program. The goal of this program is to develop “novel ways of validating the identity of [a] person … that focus on the unique aspects of the individual through the use of software-based biometrics.” Traditional authentication techniques require […]
Presented at Agile DC 2012, Tom Steihm discussed how to make secure applications using Agile Methods. Secure Agile – How to make secure applications using Agile Methods
Inspecting source code for security vulnerabilities is an important part in any secure development process. While this can be done manually, it’s much easier to start with a static analysis tool that can scan code for known vulnerabilities. Statistics out there claim anywhere from 30-50% of coding vulnerabilities can be found with a code scanner. For .NET […]
From Nextgov.com: The military venture capital wing has tapped scientists to build computer systems that can detect intruders by picking out abnormal behavior from familiar patterns generated by authorized users. Defense Advanced Research Projects Agency has awarded a contract to security software developer Coveros to research methods to validate the identity of a computer user […]
Research Will Protect Computer Systems from Unauthorized Use Coveros, Inc., the market leader in secure agile software development, today announced that the Defense Advanced Research Projects Agency (DARPA) has awarded the company a research contract to invent novel approaches for actively authenticating computer system users. This research aims to make it possible to detect, in […]
DARPA Selects Coveros to Research Active Authentication Techniques Research Will Protect Computer Systems from Unauthorized Use Loudoun County, VA, July 19, 2012 — Coveros, Inc., the market leader in secure agile software development, today announced that the Defense Advanced Research Projects Agency (DARPA) has awarded the company a research contract to invent novel approaches for […]