Email Alerts
-
Secure application development processes improving, expert says
In this interview conducted at RSA Conference 2011, Gary McGraw, chief technology officer at Cigital Inc., a software security and quality consulting firm, explains how more organizations are embracing software development processes to improve the co... Video
-
Sandboxing technology bolsters security, but it has weaknesses, expert says
Adobe Systems, Google, Microsoft and others are deploying applications that use sandboxing technology to defend against potential attacks, but savvy hackers know how to bypass it. Interview
-
Microsoft releases Attack Surface Analyzer to developers
The newly released tool helps developers identify whether newly installed applications change the attack surface of Microsoft Windows. Article
-
Technical guide to secure development practices
When security practitioners attempt to introduce secure development practices into a development process and organization, they are typically less than accepted. Development organizations tend to reject formal internal structure and process imposed f... E-Book
-
Google extends bounty program for Web application bugs
People who report serious Web application flaws in YouTube and Blogger could receive a reward as much as $3,133.70. Article
-
SecTor 2010: Mobile application security flaws a repeat of past mistakes
Developers of mobile applications are repeating many of the same coding errors that desktop coders and Web application coders made years ago, according to two security experts. Article
-
Secure Software development starts at the top
Ryan Berg a senior architect of security research for IBM talks about ways enterprises can improve their software development processes and why some firms are falling behind. News
-
Microsoft SDL documentation goes open source
Materials outlining Microsoft's Security Development Lifecycle will be transferred to a Creative Commons license. SDL tools and templates remain under an exclusive Microsoft license. News
-
CEO must prioritize software development improvements, secure coding
In this interview, Ryan Berg, a senior architect of security research for IBM discusses why some companies lack direction when it comes to secure software development. Article
-
HP to acquire Fortify Software for secure software development
Source code analysis vendor Fortify Software will eventually be integrated into HP's Business Technology Optimization application portfolio. Analysts say acquisition was expected. Article
Security Management Strategies for the CIO