Email Alerts
-
SecTor 2010: Mobile application security flaws a repeat of past mistakes
Developers of mobile applications are repeating many of the same coding errors that desktop coders and Web application coders made years ago, according to two security experts. Article | 28 Oct 2010
-
Secure Software development starts at the top
Ryan Berg a senior architect of security research for IBM talks about ways enterprises can improve their software development processes and why some firms are falling behind. News | 30 Aug 2010
-
Microsoft SDL documentation goes open source
Materials outlining Microsoft's Security Development Lifecycle will be transferred to a Creative Commons license. SDL tools and templates remain under an exclusive Microsoft license. News | 30 Aug 2010
-
CEO must prioritize software development improvements, secure coding
In this interview, Ryan Berg, a senior architect of security research for IBM discusses why some companies lack direction when it comes to secure software development. Article | 24 Aug 2010
-
HP to acquire Fortify Software for secure software development
Source code analysis vendor Fortify Software will eventually be integrated into HP's Business Technology Optimization application portfolio. Analysts say acquisition was expected. Article | 17 Aug 2010
-
Coverity, Armorize to add security to software quality process
Integrated suite gives security teams greater visibility into the software development lifecycle while letting developers focus on creating code and fixing errors. Article | 13 Jul 2010
-
Adobe focuses on secure software development lifecycle
With its popular software increasingly targeted by hackers, Adobe has stepped up efforts to secure its applications. Article | 22 Jun 2010
-
Former @stake researcher Aitel insists on data classification
Know your data before turning to the cloud, says Dave Aitel, CTO of Immunity Inc. Aitel criticized traditional security technologies at FIRST Conference 2010. Article | 16 Jun 2010
-
Gary McGraw on software security research
Gary McGraw and Sammy Miguez of CIgital talk about the latest version of the Building Security in Maturity Model (BSIMM). Thirty major companies were interviewed to find out how the firms implement security into their processes. News | 17 May 2010
-
Cigital expands software security model, includes data from 30 major firms
The Building Security in Maturity Model is free and includes a framework that outlines the best practices used at major companies. Article | 13 May 2010
Security Management Strategies for the CIO