BSIMM4: Secure development's measuring stick

Software Development Methodology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security Bytes: Consultant cracks FBI database

    In other news, a Google Reader flaw is addressed and OpenOffice patches three security holes attackers could use to tamper with files. 

  • Microsoft's new security chief: 'We've come a long way'

    Microsoft's newest top cop plans on getting his hands dirty. Ben Fathi, recently named chief of Microsoft's Security Technology Unit, said he is ready to jump into design and development to push forward the company's security offerings.

    A corpor... 

  • Security Blog Log: Doing good with exploit code

    This week, IT pros take note of the latest Microsoft patches and exploit code. Also, a look at why exploit code isn't always evil. 

  • Microsoft still unlocking its security identity

    Credibility, security… and Microsoft? Trustworthy Computing has improved Windows platform security, but don't expect Microsoft's security teams to put themselves out of business with credibility. 

  • Okopipi leaps in where Blue Security left off

    The new user group is building an open source P2P application that sends spammers automated "unsubscribe" messages. Some call it feasible, but others believe counterattack strategies are doomed to fail. 

  • Security Bytes: Fix available for RealVNC flaw

    In other news, changes may be coming for the Payment Card Industry (PCI) data security standard and Diebold will address security risks in its voting machines. 

  • Oracle refuses to learn its lesson, experts say

    Oracle critics say the database giant sits on known flaws for too long, leaving its applications open to attack. Is it time for infosec pros to extract Oracle products? 

  • Fresh Bagels offer baked-in rootkits

    The prolific worm's latest variants now sport rootkit functionality; one AV firm says most malware may soon include rootkits because attackers won't be able to resist the ROI. 

  • Checklist: Ten dos and don'ts for secure coding

    Download this checklist of dos and don'ts for developing secure code. 

  • Ten dos and don'ts for secure coding

    Security practitioners should understand how developers introduce security vulnerabilities into applications and work to support the developers in improving code quality and security. Encouragement and support for improvement must be a fundamental pa...