Email Alerts
-
Twitter worm attack highlights social network flaws
A worm attack used to promote a rival social network wreaked havoc on Twitter, but also highlighted the importance of finding and repairing Web application flaws. News
-
New model supports secure software coding
In this podcast, secure coding experts Brian Chess and Sammy Migues say their new model is the first software security blueprint based on real world data and observed activities. News
-
Firms improve secure coding practices, OWASP survey finds
Boaz Gelbord, OWASP Security Spending Benchmarks Project Leader, explains the survey results. Also, Ivan Arce of Core Security talks about smartphone threats and penetration testing. News
-
More companies seek third-party Web app code review, survey finds
Companies are taking a closer look at software code to find critical vulnerabilities, according to a new survey conducted by the OWASP foundation. Article
-
Free HP SWFScan tool detects Adobe Flash flaws
SWFScan analyzes Adobe Flash to identify dozens of source code errors. Article
-
Fuzzing tool helps Oracle DBAs defend against SQL injection
A new open source fuzzing tool is available to test PL/SQL applications for security vulnerabilities. The free tool was developed by database security vendor Sentrigo. Article
-
Educators see secure coding training challenges, improvements
University-level secure coding training is improving, but hurdles remain, professors say. Article
-
Should states lead charge for secure application development?
New York state's Application Security Procurement language could set off a cascade of initiatives in many states. News
-
New York drafts language demanding secure code
State will demand software makers certify their software does not contain the coding errors listed in the CWE/SANS Top 25 Dangerous Programming Errors. Article
-
Security experts identify 25 dangerous coding errors
A new list of common programming errors could give non-experts the ability to demand higher coding standards. Article
Security Management Strategies for the CIO