Email Alerts
-
Should states lead charge for secure application development?
New York state's Application Security Procurement language could set off a cascade of initiatives in many states. News | 16 Jan 2009
-
New York drafts language demanding secure code
State will demand software makers certify their software does not contain the coding errors listed in the CWE/SANS Top 25 Dangerous Programming Errors. Article | 14 Jan 2009
-
Security experts identify 25 dangerous coding errors
A new list of common programming errors could give non-experts the ability to demand higher coding standards. Article | 12 Jan 2009
-
Adobe hopes to speed patch releases with more transparency
Poor communication with security researchers fuels inefficiencies, the software maker said. Article | 17 Dec 2008
-
Microsoft updates code analysis tool, SQL injection XSS library
The tools for developers help identify flaws to protect enterprise applications against SQL Injection and cross site scripting attacks. Article | 16 Dec 2008
-
Metaforic crosses swords with software pirates
Company joins a number of vendors in the application hardening market with a technology that embeds protections in a program at compile time. Article | 29 Oct 2008
-
Microsoft opens up secure development program
Microsoft is extending its Security Development Lifecycle processes to third parties. Article | 19 Sep 2008
-
Mozilla's Snyder says security pros should press vendors on security
Mozilla security chief Window Snyder says security pros should pressure their vendors to be better and more transparent about security. Article | 16 Sep 2008
-
Vista functionality still wins over security
A researcher renowned for tinkering with Active X controls tossed a pail of ice water today at Black Hat on the security-first marketing associated with Vista. News | 07 Aug 2008
-
Mozilla to release Firefox threat-modeling data
Black Hat: The Mozilla Foundation's security chief says it will soon publicly release threat-modeling data for the next version of the Firefox Web browser. Article | 06 Aug 2008
Security Management Strategies for the CIO