-
Data Cleaning in Data Science
In this Data Science blog post series, we’ve talked about where to get data from and how to explore that data using pandas, but whilst that data is excellent for learning, it’s not similar to what we will term real-world data. Data for learning has often already been cleaned and curated to allow you to…
-
Rider 2025.1 Roadmap
The start of the new year is the perfect time to share our plans for JetBrains Rider 2025.1. These plans are subject to change based on available resources, evolving development priorities, and shifts in the .NET landscape. Some features and improvements may be postponed to a later release date. With that in mind, let’s dive…
-
Java Annotated Monthly – January 2025
The new year has arrived, and we’re kicking it off with another handpicked selection of must-read tutorials and the latest news you won’t want to miss. This issue starts with an amazing featured content section with Donald Raab. Settle in and scroll your way to some fresh knowledge! Featured Content Greetings, Java Annotated Monthly readers!…
-
Best Courses for Java Developers
Tired of the same predictable and monotonous Java tutorials? So was I. I used to think all Java courses were the same. Endless tutorials where someone talks about getters and setters in a monotonous, robotic voice while you put all of your effort into just trying to stay awake. After months of intensive research and…
-
Preparing for Post-Quantum Cryptography: Key Takeaways from SAFECode’s Working Group
As we mentioned in a previous blog, SAFECode’s post-quantum cryptography (PQC) working group has reached a milestone. NIST has standardized its first wave of post-quantum encryption algorithms, and our working group has identified key activities that will enable our members to manage the transition to quantum-resistant cryptography and adapt to the emergence of new algorithms…
-
Celebrating Dedication and Innovation: Highlights from SAFECode Day 2024
Over 50 SAFECode members and industry leaders came together for a dynamic SAFECode Day 2024! The event featured exciting project updates, lively discussions, and an inspiring keynote from Anne Neuberger, Deputy Assistant to the President, who emphasized the crucial role of cybersecurity in today’s digital landscape. It was great to hear our members share their…
-
The PQC Algorithm FIPS are Published – Now What?
By Brian Rosenberg, RTX Corporation and Judith Furlong, Dell Technologies with Matthew Lyon, Dell Technologies; Steve Lipner, SAFECode Introduction We made it – this far! The U.S National Institute of Standards and Technology (NIST) recently published the Federal Information Processing Standards (FIPS) for three post-quantum cryptography (PQC) algorithms, marking the end of the beginning of…
-
New SAFECode Member Council to Ensure Greater Industry Collaboration on Software Security
Oracle’s John Heimann and Siemens Energy’s Manuel Ifland Elected to Lead the Member Council WAKEFIELD, Mass. – March 6, 2024 – SAFECode has announced a new Member Council to direct its industry-led efforts to advance software security practices. Chaired by John Heimann, Vice President of Security Program Management at Oracle, and Vice Chaired by Manuel…
-
Threat Modeling at Scale
According to the Threat Modeling Manifesto, Threat Modeling is an activity “for analyzing representations of a system to highlight concerns about security and privacy and if applicable, safety characteristics”. Threat modeling is a crucial activity of the secure development lifecycle (SDL) for identifying and mitigating weaknesses and potential security vulnerabilities. Threat modeling is most effective…
-
Secure by Design? The U.S. Government and Requirements for Secure Development
The last two months have seen the release of three new U.S. Government documents related to software security: The National Cybersecurity Strategy released in early March covers the landscape of cybersecurity concerns and introduces the concept of shifting the liability for insecure software products and services from consumers to suppliers. In mid-April, The Cybersecurity and…