Risk
2/15/2013
11:27 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Coverity Expands Global Footprint

Announces the opening of four new offices

SAN FRANCISCO, Feb. 13, 2013 /PRNewswire/ -- Coverity, Inc., the leader in development testing, today announced the opening of four new offices, as well as the expansion of three existing offices, across Asia, Europe and North America.

The company cited the rising worldwide demand for development testing across all industries as the reason for its expansion.

To increase its customer support in two of the fastest growing economies in the world, Coverity opened new offices in Bangalore, India, and Beijing, China. The company also opened a new C# Center of Excellence in Seattle, led by veteran Microsoft developer Eric Lippert, and a new field office in Paris. In addition, Coverity is expanding its existing footprint with increased office space in London, Boston and Calgary, Canada, and increased personnel in Munich, New York and Toronto.

"The world is increasingly becoming software-driven, and companies can no longer ignore the business impact that a software failure or security breach can have on their brands or on their bottom lines," said Anthony Bettencourt, CEO for Coverity. "Coverity is committed to the continued success of our 1,100+ customers with a platform that integrates quality and security testing seamlessly into their respective development processes. With the new offices, we'll be able to better support our customers in these key regions and continue on our path of rapid growth and new customer acquisition."

Founded in 2003, Coverity has grown from its roots as a project born in the Computer Systems Laboratory at Stanford University to a global enterprise with more than 275 employees, based in 11 offices that span ten countries and three continents.

About Coverity

Coverity, Inc., (www.coverity.com), the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use Coverity's development testing platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco. Coverity is funded by Foundation Capital and Benchmark Capital. Follow us on Twitter or check out our blog.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?