lexington soft

What is Code Review? Guidelines and Best Practices

Thursday, July 22, 2021

Code review is the process of mandating systematically one or several developers to review the code written by another developer in other to detects defect and to improve it. Code review is more often performed by an experienced developer considering the various aspects including the quality and security of code, sharing the knowledge, enabling better …

benefits of test management

Understanding the benefits of test management and BDD

Thursday, December 24, 2020

Teams have been testing software for as long as software has existed. With the increased adoption of continuous integration and delivery, automated tests are becoming essential. Behaviour-driven development (BDD) is a modern approach to developing software that grew out of Agile and test-driven development. Most teams/organisations can benefit from test management and BDD, but BDD …

Grammatech binary code analysis tool

Open-source Tools for Binary Analysis and Rewriting

Thursday, November 19, 2020

Unfortunately binary-only software is unavoidable; dependencies of active software projects, firmware and applications distributed without source access, or simply old software whose developers are no longer drawing pay checks (or drawing breath). Consequently binary analysis and rewriting are topics of perennial interest to security and software engineering researchers and practitioners. Binary analysis enables the review of …

lexington soft defensecode partnership

Lexington Soft Partners With DefenseCode to Bridge the Gap Between Security and DevOps

Thursday, October 22, 2020

Chennai, Tamil Nadu, India:  Lexington Soft Pvt. Ltd., has been appointed as a best-in-class enterprise software products and software development tools, to represent DefenseCode across South East Asia. DefenseCode offers two licensed solutions: Its flagship product, ThunderScan® is a SAST (Static Application Security Testing, WhiteBox Testing) solution for performing deep and extensive security analysis of …