You are here


Snapshot: Top 25 Most Dangerous Software Errors

The Common Weakness Enumeration (CWE) list of the 25 most dangerous software errors is a compilation of the most frequent and critical errors that can lead to serious vulnerabilities in software.

S&T Will Be at FDIC 2019

If you are a Fire & Rescue professional attending the Fire Department Instructors Conference in Indianapolis, mark your calendars to join S&T John Merrill  and discuss how to “Make Firefighting Safer with Artificial Intelligence.” This discussion will be held in rooms 138-139 on , from to at the Indiana Convention Center & Lucas Oil stadium.


The goal of the Department of Homeland Security Science and Technology Directorate’s (S&T) Application Security Threat and Attack Modeling (ASTAM) Project is to produce new methods for analyzing the security of software applications that will make it faster and easier to adopt application security and identify more vulnerabilities.


The Static Analysis Tools Modernization Project (STAMP) seeks to modernize static code software analysis tools.

Cyber Tip: Become Cyber Savvy... Security Tips for Software Developers

Poor coding practices exposes vulnerabilities in software in, that’s way it’s important to build security in during all phases of the development life cycle. One way to reduce the amount of security breaches is to build security in from the start. DHS S&T's Cyber Security Division Program Manager Kevin Greene shares security tips for software developers.

Computer Forensic Software

Forensic software are applications used to collect and examine evidence from computer systems or digital storage devices. This software is an important investigative tool used by specially trained professionals to collect, analyze, and report information on technology crimes. Included reports: highlight, market survey report, and application note.

Video Management Software

Video management software allows for highly scalable video network monitoring; it may be used to monitor a single camera feed at a single location or to monitor numerous feeds at numerous locations.This software is used by law enforcement personnel in covert and overt surveillance operations. Included report: market survey report.


Subscribe to Software
Back to Top