The U.S. government recently released a report calling on the technical community to proactively reduce the attack surface area of software infrastructure. The report emphasized memory safety vulnerabilities, which affect how memory can be accessed, written, allocated, or deallocated.
The report cites this class of vulnerability as a common theme in the some of the most infamous cyber events, such as the Morris worm of 1988, the Heartbleed vulnerability in 2014, and the Blastpass exploit of 2023.
Herb Sutter) works at Microsoft) and chairs the ISO C++ standards committee. He joins the show to talk about C++ safety.
)
Jordi Mon Companys) is a product manager and marketer that specializes in software delivery, developer experience, cloud native and open source. He has developed his career at companies like GitLab, Weaveworks, Harness and other platform and devtool providers. His interests range from software supply chain security to open source innovation. You can reach out to him on Twitter at @jordimonpmm).
Please click here to see the transcript of this episode.)
Sponsorship inquiries: [email protected])
The post C++ Safety with Herb Sutter) appeared first on Software Engineering Daily).