By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Secure software development News
April 14, 2017
News roundup: DARPA's SSITH program tackles hardware vulnerabilities for better security. Plus, new risks placed in OWASP Top 10, SWIFT launches new anti-fraud tool, and more.
February 24, 2017
Security expert Bruce Schneier said programmers' freedom to code whatever they want will likely come to an end. Should the industry brace itself for software regulations?
January 09, 2017
Truffle Hog utility roots out and detects text blobs with enough entropy to be secret keys -- even those buried deep in old Git repositories -- to prevent exploits.
December 20, 2016
Google offers developers a new tool, Project Wycheproof, to strengthen crypto libraries with a testing suite to check libraries for known weaknesses.
Secure software development Get Started
Bring yourself up to speed with our introductory content
DevSecOps: It's not just a cool new buzzword; it's the future of software development. Learn why as well as how to achieve better security in the development process. Continue Reading
Runtime application self-protection (RASP) is security software that monitors application inputs and behavior and takes action to deal with suspicious events automatically or, if necessary, alert an administrator. Continue Reading
Runtime application self-protection, or RASP, is one of the latest efforts to build security into applications as they execute. RASP tools monitor and detect real-time application attacks and then fend them off through various methods. These ... Continue Reading
Evaluate Secure software development Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
New FDA medical device guidance demonstrates the need for better cybersecurity during manufacturing and use. Expert Nick Lewis explains how enterprises can use the recommendations. Continue Reading
Hackers will exploit any entrance to enterprise data they can find. Make sure to erect more than just a network-level fence to ensure nobody crashes the data party. Continue Reading
Companies have a lot at stake with IoT. A myriad of tools are emerging that provide the security features necessary to ensure connected enterprises don't get hacked. Continue Reading
Manage Secure software development
Learn to apply best practices and optimize your operations.
Concerned about DevOps security? Learn three key steps to embedding security into the software development process, including how to improve automation. Continue Reading
The CSA's guidelines for secure IoT development can give enterprises an idea of how to evaluate IoT products. Expert Nick Lewis explains the steps enterprises should take. Continue Reading
Building an effective application security program can be daunting. Sean Martin talks with experts about the best first steps enterprises should take. Continue Reading
Problem Solve Secure software development Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Education and training are crucial parts of a strong application security program. Sean Martin explains how enterprises should build these elements into their programs. Continue Reading
A new Veracode report offers details on common mobile application security risks. Expert Michael Cobb explains these flaws, and what developers can do to reduce them. Continue Reading
Copying and pasting bad code into an application is a big problem for developers, but software transplants can help. Expert Michael Cobb explains the technology. Continue Reading