Access "Secure from the Start"
This article is part of the March 2006 issue of Captive to SOX compliance? A compliance guide for managers
Get off on the right foot by... ...working with your developers to ingrain security in the coding process. More information from SearchSecurity.com Register for a live webcast on tools for securing the software development lifecycle with contributor and SystemExperts consultant Michael Jordan. Download Chapter 5 from Gary McGraw's Software Security: Building Security In. Visit our resource center for tips and expert advice on security software development. Features & functions--not security--have been top-of-mind for most companies in application development. But the price for that oversight can be steep: exposed confidential data, stolen customer account information and multiple vulnerabilities. Many of these problems can be avoided by planning for security at the starting gate--in software development. Architecture, design and coding offer opportunities to make applications and services more secure. By taking security into account throughout the development cycle--defining security requirements, classifying data, coding securely and conducting thorough ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Compliance Guide for Managers
SPECIAL How to influence the C-suite, save your company money, please auditors and secure your data.
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Portable device security: Centennial Software's DeviceWall 3.1
Read a security product review of Centennial Software's DeviceWall 3.1.
-
Secure from the Start
SOFTWARE DEVELOPMENT Get off on the right foot by working with your developers to ingrain security in the coding process.
-
Integrated Security
Symantec's Gateway Security 5600 series
-
Compliance Guide for Managers
-
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Hot Pick: NFR Security's Sentivist 5.0
NFR Security's Sentivist 5.0
-
Google Hacking: Why being a Google dork is hurting your company
Are you a Google dork? A simple Google search engine query can expose corporate security secrets and private information. Black hats are aware of it. Are you? Learn how to prevent and defend against Google hacking.
-
Unplugged
PRODUCT REVIEW Even if you don't have an unauthorized WLAN, you need protection.
-
Recent Releases: Security product briefs, March 2006
-
Columns
-
Editor's Desk: The case for application-layer security
C++ - Security = 0
-
Layer 8: Military, defense sectors offer little security leadership
Military Madness
-
Prespectives
No Guarantee
-
Ping: William Pelgrin
William Pelgrin
-
Editor's Desk: The case for application-layer security
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO