Software Development Methodology News
February 24, 2017
Security expert Bruce Schneier said programmers' freedom to code whatever they want will likely come to an end. Should the industry brace itself for software regulations?
January 09, 2017
Truffle Hog utility roots out and detects text blobs with enough entropy to be secret keys -- even those buried deep in old Git repositories -- to prevent exploits.
December 20, 2016
Google offers developers a new tool, Project Wycheproof, to strengthen crypto libraries with a testing suite to check libraries for known weaknesses.
August 22, 2016
Want security built into the DevOps process? It might not completely bulletproof an application, but experts say that any security added at the code level will pay dividends down the road.
Software Development Methodology Get Started
Bring yourself up to speed with our introductory content
Runtime application self-protection (RASP) is security software that monitors application inputs and behavior and takes action to deal with suspicious events automatically or, if necessary, alert an administrator. Continue Reading
Runtime application self-protection, or RASP, is one of the latest efforts to build security into applications as they execute. RASP tools monitor and detect real-time application attacks and then fend them off through various methods. These ... Continue Reading
Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Software Development Methodology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Hackers will exploit any entrance to enterprise data they can find. Make sure to erect more than just a network-level fence to ensure nobody crashes the data party. Continue Reading
Companies have a lot at stake with IoT. A myriad of tools are emerging that provide the security features necessary to ensure connected enterprises don't get hacked. Continue Reading
Microsoft's fuzzing as a service cloud initiative, called Project Springfield, can make a significant difference to software security. Expert Matthew Pascucci explains. Continue Reading
Manage Software Development Methodology
Learn to apply best practices and optimize your operations.
The CSA's guidelines for secure IoT development can give enterprises an idea of how to evaluate IoT products. Expert Nick Lewis explains the steps enterprises should take. Continue Reading
Building an effective application security program can be daunting. Sean Martin talks with experts about the best first steps enterprises should take. Continue Reading
A new research programming language looks to make it easier to enforce security and privacy policies in applications. Expert Michael Cobb explains how it works. Continue Reading
Problem Solve Software Development Methodology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Education and training are crucial parts of a strong application security program. Sean Martin explains how enterprises should build these elements into their programs. Continue Reading
A new Veracode report offers details on common mobile application security risks. Expert Michael Cobb explains these flaws, and what developers can do to reduce them. Continue Reading
Copying and pasting bad code into an application is a big problem for developers, but software transplants can help. Expert Michael Cobb explains the technology. Continue Reading