Email Alerts
-
Source code security scanners: A revamped option for securing custom software
Software development teams are no longer limited to pen testing and manual code analysis for securing custom code. Tip
-
Thwarting the ultimate inside job: Malware introduced in the software development process
Ed Skoudis offers tips for securing the software development process. Tip
-
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
This chapter examines the players involved in software forensics. Tip
-
An indictment for applications development
Twenty years into the client-server revolution, it's a measure of inadequacy of secure coding that only now are the first books being written on how to secure software. Tip
-
Oracle's Mary Ann Davidson: Secure coding? Absolutely!
Mary Ann Davidson, CSO of Oracle, responds to Andy Briney's commentary on secure coding. Tip
-
Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow
This excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw. Tip
-
Secure software: The source of the problem is the solution
The solution to almost all insecure coding is right before our very eyes. Programmers just need to take the proper precautions and carefully write out the code. Tip
-
Secure coding essential to risk mitigation planning
Information Security magazine's editorial director Andrew Briney talks about the lack of incentive for making code more secure. Tip
-
Security in the software development life cycle
Small changes in the software development life cycle can substantially improve security without breaking the bank or the project schedule. Tip
-
Customizing the Security Architecture
This chapter demonstrates ways to augment the security architecture, including how to develop custom implementations of the various security classes. Tip
Security Management Strategies for the CIO