New & Notable
Software Development Methodology News
September 16, 2014
Developers increasingly rely on a variety of open source components, but a VerSprite researcher warns that security issues accompany many popular frameworks.
June 10, 2014
Video: Chris Wysopal of Veracode discusses the risks of externally sourced code and monitoring its use in the enterprise.
May 21, 2014
As attackers increasingly target e-commerce websites, vulnerable applications and third-party plug-ins represent an easy avenue of exploitation.
March 31, 2014
Gary McGraw discusses why the software security segment of the IT security industry is growing at a faster rate than the category as a whole.
Software Development Methodology Get Started
Bring yourself up to speed with our introductory content
Nick Lewis discusses the concept of sandboxing and how vendors are using network appliance sandboxes to boost network protection and malware defense. Continue Reading
This compilation of content featuring software security expert Gary McGraw covers every aspect of secure software development, from training to coding to post-launch analysis. Continue Reading
Building security into the software development process lowers both risks and costs in the long term. This collection explains how it can be done. Continue Reading
Evaluate Software Development Methodology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Gary McGraw says real medical device security requires more than worrying about patient data. Continue Reading
Secure software development expert Gary McGraw says what's great about the IEEE's new design center is that it tackles the thorniest problem. Continue Reading
Does a Web application security assessment termed 'compliance ready' seem too good to be true? Learn its role in an enterprise compliance program. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
A good choice if you are a .Net, Java SaaS provider looking for a Security as a Service solution. Their services take you through application...Continue Reading
Powered by IT Central Station
v2 Review: Premature product - not a proper product to be used for PCI approved web scanning Having done numerous penetration tests using...Continue Reading
Centerbeam's security options for good data security 1. closed API's 2.Integration tied to customer environment and ActiPowered by IT Central Station
Valuable Features: The access of your whole group of data and the functionality of the command line, it is direct and very easy to use, in...Continue Reading
Manage Software Development Methodology
Learn to apply best practices and optimize your operations.
Marcus Ranum chats with Gary McGraw about secure system design and the IEEE Computer Center for Secure Design’s top 10 list of what to avoid. Continue Reading
Expert Gary McGraw thinks the way to get software security right is to keep the testing close to the developer environment. Continue Reading
CISOs need buy-in from the top down to build successful software security programs. Continue Reading
Problem Solve Software Development Methodology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
SQL injection attacks continue to plague enterprises. However, performing audit code validation when using outsourced developers can be a challenge. Expert Nick Lewis explains how to prevent these attacks. Continue Reading
Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. Continue Reading
Find hidden malware or security weaknesses by decompiling Android applications into Java source code. Continue Reading