Email Alerts
-
Secure software development lifecycle still lacking at dev firms
Survey finds more firms adding security into the software development lifecycle, still many fail to use a formal methodology. Article
-
Google researchers out kernel bugs in Windows, Linux and VMware
Google engineers find 20 kernel flaws, half of which are still not patched. Article
-
fuzz testing (fuzzing)
Fuzz testing or fuzzing is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash... (Continued) Definition
-
Is it safe to use third-party code when developing database applications?
Michael Cobb explains how you can safely use third-party code, such as DLLs, when developing database applications. Ask the Expert
-
Static analysis tools boost security, but integration still an issue
Code analysis tools are available and help improve security, but why do some firms shun them? Article
-
Secure software development is difficult, but tools, techniques improving, expert says
The SANS Institute and MITRE Corp. issued an update to the CWE/SANS Top 25 Programming Errors List last week, focusing mitigation techniques that could be adopted into the security development lifecycle to he... Interview
-
SANS Institute, MITRE release new top 25 dangerous coding errors list
The latest list adds profiles to help organizations tailor the list to their needs and mitigation techniques to help software developers apply better practices to the SDL. Article
-
Securing naming and directory services for application defense-in-depth
There are several aspects of naming and directory services when it comes to security. In this tip, part of the SearchSecurity.com Application Security School lesson, learn how to secure LDAP, as well as how application security teams can work with in... Tip
-
Improving software with the Building Security in Maturity Model (BSIMM)
Learn about the Building Security in Maturity Model (BSIMM), a software security framework that emphasizes attack models, software security testing, code review and compliance policies. Also, does your company have a software security group (SSG)? Tip
-
Tips for writing secure SQL database code
Writing secure code is always a challenge, but it is particularly necessary for SQL databases that would otherwise be vulnerable to SQL injection attacks. Get tips on how to write secure SQL database code in this expert response. Ask the Expert
Security Management Strategies for the CIO