Email Alerts
-
How can gap analysis be applied to the security SDLC?
When developing software securely, what role does gap analysis play? In this security management expert response, learn how to implement gap analysis into software development, and how it can help stop data leaks at your enterprise. Ask the Expert
-
Microsoft opens up secure development program
Microsoft is extending its Security Development Lifecycle processes to third parties. Article
-
Mozilla's Snyder says security pros should press vendors on security
Mozilla security chief Window Snyder says security pros should pressure their vendors to be better and more transparent about security. Article
-
Vista functionality still wins over security
A researcher renowned for tinkering with Active X controls tossed a pail of ice water today at Black Hat on the security-first marketing associated with Vista. News
-
Mozilla to release Firefox threat-modeling data
Black Hat: The Mozilla Foundation's security chief says it will soon publicly release threat-modeling data for the next version of the Firefox Web browser. Article
-
Gary McGraw on secure software development
Gary McGraw of Cigital Inc. explains why better secure coding could help thwart future Web 2.0 attacks. He says the industry is making progress. Video
-
Security issues found in the Spring Framework
Ounce Labs recently discovered two security vulnerabilities that can affect Java Web applications that use the Spring Framework. News
-
Software still plagued with security holes, researcher says
In this podcast, noted security researcher Greg Hoglund, who specializes in Windows rootkits and secure coding, explains why software is just as vulnerable today as it was in 1999. Article
-
Microsoft tools won't be quick fix for SQL injection attacks
Microsoft's security advisory will help raise awareness about secure software coding, but it won't stop the onslaught of SQL injection attacks, experts say. Article
-
Which automated quality assurance tools can be used to test software?
If your application development process is not yet addressing security at all six phases of the lifecycle, now is the time to start. Application security expert Michael Cobb explains which quality assurance tools can help. Ask the Expert
Security Management Strategies for the CIO