Fortify Sponsors FindBugsFortify Sponsors FindBugs
Fortify has joined the FindBugs project as a sponsr, and is helping to expand the functionality of the open source tool
![Dark Reading Dark Reading logo in a gray background | Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
SAN FRANCISCO -- Fortify Software Inc., a leading provider of security products that help companies identify, manage and remediate software vulnerabilities to mitigate enterprise security risk, today announced that Fortify has joined the FindBugs project as a sponsor, and is helping to expand the functionality of the open source tool, which has had over 200,000 downloads.
FindBugs, originally developed by William Pugh, professor at the University of Maryland, Packard Fellow, and a member of Fortify's Technical Advisory Board, is an open source software tool which looks for bugs in Java programs and detects common coding mistakes. The software is based on the concept of bug patterns, and shows potential problems to programmers as they code.
In addition to its sponsorship, Fortify also announced Findbugs' integration with its award winning Fortify Source Code Analysis product. Developers can run FindBugs in conjunction with Fortify Source Code Analysis, and can then load and view the results from various Fortify tools such as Fortify Audit Workbench and Fortify Software Security Manager, giving developers a central view of all results.
"Bugs are a fact of life. I try as hard as I can to write bug-free code, but still the bugs creep in," said Josh Block, Chief Java technology architect at Google. "Since you can't avoid introducing bugs, it's critical to find and exterminate them. FindBugs is the easiest, most effective way I know to find the bugs that lurk in my code."
Read more about:
2006About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025