Email Alerts
-
Microsoft extends SDL program, adds Agile development template
Microsoft is adding support for Agile Development Methodologies to its Security Development Lifecycle program. A simplified SDL white paper is also being introduced. Article
-
Malware in Google attacks uses spaghetti code
Coding technique designed to tie up reverse engineers has been used in the past, Symantec says. News
-
Self-defending Web applications thwart attacks
Michael Coates, a volunteer with OWASP, is leading a project that helps developers inject code into applications to give them self-defense mechanisms. News
-
Software piracy group offers cash to whistleblowers
An industry group made up of software companies is offering workers in the U.K. more than $30,000 to blow the whistle on pirated software in their workplace. Article
-
Quiz: How to build secure applications
Use this five-question quiz to test your knowledge of how to secure your enterprise apps. Quiz
-
How to detect software tampering
In their book Surreptitious Software, authors Christian Collberg and Jasvir Nasvir reveals how to tamperproof your software and make sure it executes as intended. Tip
-
Should security tests be part of a software quality assurance program?
Application security expert Michael Cobb reviews the essentials of any software quality assurance process. Ask the Expert
-
Does an EULA make it truly illegal to decompile software?
Michael Cobb explores a legal minefield: the legality of software decompilation. Ask the Expert
-
SQL injection continues to trouble firms, lead to breaches
Security experts see the secure software development lifecycle improving, but legacy applications and Web server flaws continue to offer a rich treasure trove for attackers. Article
-
Verifying the security of software with static and dynamic verification
Secure software is critical to all businesses, and security verification is an important part of that process. In this expert response, learn the difference between static and dynamic verification of security in software engineering. Ask the Expert
Security Management Strategies for the CIO