BSIMM4: Secure development's measuring stick

Software Development Methodology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Editor’s desk: A chat with Peter G. Neumann

    Peter G. Neumann shares his thoughts on the inherent complexity of trustworthiness and the evolutionary promise of clean-slate architectures. 

  • Firm pushes software security testing with fugitive tracking system

    System that helps law enforcement track down fugitives was tested thoroughly to prove to CTOs and IT teams that the company is serious about security. 

  • Information security book excerpts and reviews

    Visit the Information Security Bookshelf for book reviews and free chapter downloads. 

  • Quiz: How to build secure applications

    Use this five-question quiz to test your knowledge of how to secure your enterprise apps. 

  • Geekonomics: The Real Cost of Insecure Software

    In Chapter 1 of his new book, "Geekonomics: The Real Cost of Insecure Software," David Rice examines why software manufacturers continue to produce (and consumers continue to purchase) unreliable and insecure software. 

  • The Art of Software Security Testing

    Read an excerpt from the book, The Art of Software Security Testing: Identifying Software Security Flaws. In Chapter 11, "Local Fault Injection," the authors explain the proper methods for examining file formats. 

  • How to build secure applications

    In this lesson, learn how to build security into the software development lifecycle, implement a practical, efficient change management system and test your applications using a black-box or white box technique. 

  • Attacks targeted to specific applications

    This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," pu... 

  • PING with Aviel Rubin

    In this exclusive interview with Information Security magazine, Aviel Rubin, author of "Brave New Ballot" examines security problems in e-voting machines, and details why isn't just a cause for concern, it's a matter of national security. 

  • Checklist: Ten dos and don'ts for secure coding

    Download this checklist of dos and don'ts for developing secure code.