Software Development
Nearly 200 firms have signed pledge to build more secure software, top cyber official says
The initial tally began at around 70 companies when CISA first headlined the initiative at RSA Conference in San Francisco.
How the CrowdStrike outage carved out new opportunities for hackers
Former U.S. officials and security practitioners are wondering how a defective CrowdStrike patch for Windows systems fell through the cracks and created more cascading security risks.
White House in talks with industry to build legal framework for software liability
As part of a broad cybersecurity strategy, the U.S. wants to create incentives for the tech industry to manufacture products and software that don’t contain major security flaws.
Linux backdoor was a long con, possibly with nation-state support, experts say
If the XZ Utils vulnerability hadn’t been caught in time, hackers would have had a “skeleton key to the world,” one analyst told Nextgov/FCW.
How to fix the military’s software SNAFU
COMMENTARY | Too many of its apps are built on code riddled with vulnerabilities—and distributed by the Pentagon itself.
CISA rolls out secure software attestation form
A repository for software attestation submissions will be available later in March.
White House urges software developers to use memory-safe programming languages
A number of headline-making cyberattacks started with memory safety flaws, a White House cyber official said.
White House to release memory-safe code guidance in coming weeks
The U.S. and other intelligence partners have previously advised developers to adopt memory-safe programming languages.
Cruz, Peters introduce bill prodding agencies to share custom code
The lawmakers say that existing policies on sharing such code aren’t being implemented by agencies.
Congress takes up software supply chain security
The FITARA scorecard could become a vehicle for measuring agency progress against the administration's software security goals.
Job 1 for makers of anti-drone defenses: write good software
Pentagon buyers are looking for control systems that are reliable, easy to use, and simple to update.
Army hopes big-data techniques can help secure its clouds
“Multifactor authentication will not be enough,” said the Army’s senior cyber leader.
Featured eBooks