Email Alerts
-
Eye On: Secure Software Development
This special report explores software security: reducing vulnerabilities and improving development processes. Article
-
Security pros find software code security improvements, weigh next step
Secure coding practices are improving at many software vendors, fueled by an increased emphasis on secure coding frameworks, training and new processes. News
-
Secure software development: Getting started
Chris Eng, senior security researcher at Veracode Inc., explains how firms can get started improving their software development processes. Video
-
Microsoft cites software security progress despite sluggish ASLR support
Microsoft's 2010 SDL progress report praised the software security program's steady progress, but points out room for further improvements. Article
-
Common Weakness Enumeration (CWE)
Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software... (Continued) Definition
-
Industry groups, businesses attempt security awareness training plan
Security training and education is one of the first investments made by an organizations after poor audit results or a data breach, experts say. Article
-
Can threat modeling tools help with securing mobile applications?
When developing enterprise applications, do you know the quickest way to bridge the gap between an information security team and a development group? Answer
-
Secure application development processes improving, expert says
In this interview conducted at RSA Conference 2011, Gary McGraw, chief technology officer at Cigital Inc., a software security and quality consulting firm, explains how more organizations are embracing software development processes to improve the co... Video
-
Microsoft releases Attack Surface Analyzer to developers
The newly released tool helps developers identify whether newly installed applications change the attack surface of Microsoft Windows. Article
-
Sandboxing technology bolsters security, but it has weaknesses, expert says
Adobe Systems, Google, Microsoft and others are deploying applications that use sandboxing technology to defend against potential attacks, but savvy hackers know how to bypass it. Interview
Security Management Strategies for the CIO