Email Alerts
-
Cigital BSIMM 3 study provides software security metrics data
The third iteration of the widely acclaimed Building Security in Maturity Model documents software security initiatives at 42 enterprises. News
-
Measurement first among secure software development benchmarks
One expert says before implementing secure software development benchmarks, take stock of the security of existing applications. News
-
Secure coding best practices: PHP and programming language security
Michael Cobb explains how proper secure coding training is much more important than PHP programming language security. Answer
-
How to mitigate the risk of a TOCTTOU attack
Are TOCTTOU attacks, exploiting time-of-check-to-time-of-use race conditions, a threat to your enterprise file systems? Expert Michael Cobb discusses the dangers and how to mitigate them. Answer
-
Citigroup attack highlights insufficient authorization error
Citigroup hackers used a common website vulnerability to bypass security controls and reap confidential banking data. News
-
Cigital acquires Consciere, brings in security vets
Software security consultancy Cigital has acquired Consciere, bringing in security veterans Joel Scambray and Kevin Rich. News
-
Information security book excerpts and reviews
Visit the Information Security Bookshelf for book reviews and free chapter downloads. Information Security Book
-
Software remediation can get caught in organizational issues
Running an application security program requires more than a solid budget. It needs a person with deep knowledge of the organization and its engineering processes. News
-
UTM features: Is a UTM device right for your layered defense?
Expert Mike Chapple explores what features a contemporary UTM device provides, and explains the factors that help determine UTM total cost of ownership. Tip
-
Marcus Ranum on the consequences of poor software design
Marcus Ranum discusses the consequences of poor software design and what can be done to ensure this does not happen in the future. Video
Security Management Strategies for the CIO