Blog Post by Natalia Kazankova
Natalia Kazankova
Dec 20, 2024 1:29:27 PM
6
min read
How to automate fuzz testing: from start to findings
Discover how to automate fuzz testing and uncover ...
Start Reading
Natalia Kazankova
Dec 13, 2024 3:30:04 PM
4
min read
Integrating fuzz testing in the V-model testing process for secure software
Learn how to integrate fuzz testing into the ...
Start Reading
Natalia Kazankova
Oct 22, 2024 3:54:36 PM
6
min read
Understanding, detecting, and fixing buffer overflows: a critical software security threat
Learn how to detect, prevent, and fix buffer ...
Start Reading
Natalia Kazankova
Oct 2, 2024 11:34:27 AM
2
min read
Code Intelligence Launches Classic AUTOSAR Simulator for Scalable Testing and Early Detection of Vulnerabilities, Reducing Hardware Dependency in Automotive Testing
Code Intelligence launches Classic AUTOSAR ...
Start Reading
Natalia Kazankova
Sep 27, 2024 11:49:09 AM
8
min read
Eric Brüggemann on the role of AI-powered fuzzing in securing automotive software
How AI-powered fuzz testing is revolutionizing ...
Start Reading
Natalia Kazankova
Aug 8, 2024 5:09:22 PM
7
min read
The V-model and its role in testing embedded software
Lear everything about the V-Model and its ...
Start Reading
Natalia Kazankova
Aug 2, 2024 2:36:33 PM
4
min read
Top 5 reasons to fuzz embedded systems
Explore the benefits of fuzz testing for embedded ...
Start Reading
Natalia Kazankova
Jul 11, 2024 3:53:17 PM
2
min read
FDA’s cybersecurity requirements for medical devices and when to comply with them
Discover FDA's cybersecurity standards for ...
Start Reading
Natalia Kazankova
Jun 11, 2024 4:25:58 PM
8
min read
How AI adoption throughout the SDLC affects software testing
Curious of the impact that AI adoption is having ...
Start Reading
Natalia Kazankova
May 24, 2024 3:56:19 PM
7
min read
The ethical considerations for AI-powered software testing
Explore the ethical considerations, benefits, and ...
Start Reading
Natalia Kazankova
May 17, 2024 1:57:23 PM
4
min read
Why Static Analysis (SAST) isn’t enough to prevent critical bugs in embedded software
The best security practice involves leveraging ...
Start Reading
Natalia Kazankova
May 14, 2024 10:26:56 AM
6
min read
Protect your Hardware Security Module against edge cases with Code Intelligence
Interested in securing your Hardware Security ...
Start Reading