Email Alerts
-
Software remediation can get caught in organizational issues
Running an application security program requires more than a solid budget. It needs a person with deep knowledge of the organization and its engineering processes. News
-
UTM features: Is a UTM device right for your layered defense?
Expert Mike Chapple explores what features a contemporary UTM device provides, and explains the factors that help determine UTM total cost of ownership. Tip
-
Marcus Ranum on the consequences of poor software design
Marcus Ranum discusses the consequences of poor software design and what can be done to ensure this does not happen in the future. Video
-
Eye On: Secure Software Development
This special report explores software security: reducing vulnerabilities and improving development processes. Article
-
Security pros find software code security improvements, weigh next step
Secure coding practices are improving at many software vendors, fueled by an increased emphasis on secure coding frameworks, training and new processes. News
-
Secure software development: Getting started
Chris Eng, senior security researcher at Veracode Inc., explains how firms can get started improving their software development processes. Video
-
Microsoft cites software security progress despite sluggish ASLR support
Microsoft's 2010 SDL progress report praised the software security program's steady progress, but points out room for further improvements. Article
-
Common Weakness Enumeration (CWE)
Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software... (Continued) Definition
-
Industry groups, businesses attempt security awareness training plan
Security training and education is one of the first investments made by an organizations after poor audit results or a data breach, experts say. Article
-
Can threat modeling tools help with securing mobile applications?
When developing enterprise applications, do you know the quickest way to bridge the gap between an information security team and a development group? Answer
Security Management Strategies for the CIO