Email Alerts
-
Creating a third-party security policy to prevent a software exploit
Third-party software vulnerabilities are one of the most likely attack vectors in the information security landscape today. In this expert response, Nick Lewis discusses how to prevent these vulnerabilities from becoming exploits. Ask the Expert
-
Coverity, Armorize to add security to software quality process
Integrated suite gives security teams greater visibility into the software development lifecycle while letting developers focus on creating code and fixing errors. Article
-
An application security framework for infrastructure security managers
Video: Get a primer on common application attack methods and an application security framework to help infrastructure security teams. Video
-
Adobe focuses on secure software development lifecycle
With its popular software increasingly targeted by hackers, Adobe has stepped up efforts to secure its applications. Article
-
Former @stake researcher Aitel insists on data classification
Know your data before turning to the cloud, says Dave Aitel, CTO of Immunity Inc. Aitel criticized traditional security technologies at FIRST Conference 2010. Article
-
Static source code analysis tools: Pros and cons
Static source code analysis tools can greatly improve application security, but it takes knowledge and expertise to use them correctly. Expert Michael Cobb explains why. Ask the Expert
-
Gary McGraw on software security research
Gary McGraw and Sammy Miguez of CIgital talk about the latest version of the Building Security in Maturity Model (BSIMM). Thirty major companies were interviewed to find out how the firms implement security into their processes. News
-
Cigital expands software security model, includes data from 30 major firms
The Building Security in Maturity Model is free and includes a framework that outlines the best practices used at major companies. Article
-
Researchers aim to smarten Web application security scanners
Adding the "human element" to scanners could help pen testers evaluate a larger portion of an application's attack surface, according to two researchers at SOURCE Boston 2010. Article
-
Metasploit creator sees no end to software security vulnerability issues
Metasploit creator and vulnerability expert H.D. Moore says secure coders are doing a better job creating applications with fewer bugs, but an ever increasing number of applications leaves no shortage in the number of new software vulnerabilities. In... Interview
Security Management Strategies for the CIO