Software Development Methodology News
October 16, 2015
Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.
July 30, 2015
Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?
July 17, 2015
News roundup: Are the tides turning on mobile app safety? One white hat hacker's attempt to reverse-engineer the Subway app offers surprising results. Plus: CloudFlare Transparency Report; another call to eliminate RC4; Black Hat attendant survey.
June 23, 2015
In its State of Software Security Report, Veracode has found the government has the most vulnerabilities and the lowest rate of remediation in developing Web and mobile apps.
Software Development Methodology Get Started
Bring yourself up to speed with our introductory content
A new Veracode report offers details on common mobile application security risks. Expert Michael Cobb explains these flaws, and what developers can do to reduce them. Continue Reading
Expert Kevin Beaver explains how organizations should address end-of-software development dates, and what they ultimately mean to enterprise security. Continue Reading
Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to... Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Software Development Methodology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises push for short development cycles to meet delivery deadlines. Expert Michael Cobb explains how to incorporate application development security into the process. Continue Reading
Copying and pasting bad code into an application is a big problem for developers, but software transplants can help. Expert Michael Cobb explains the technology. Continue Reading
The top companies and application security products that organizations consider when they seek to reduce their application vulnerabilities. Continue Reading
Manage Software Development Methodology
Learn to apply best practices and optimize your operations.
A new research programming language looks to make it easier to enforce security and privacy policies in applications. Expert Michael Cobb explains how it works. Continue Reading
Flaws in the AFNetworking code library threaten iOS app security. Expert Michael Cobb explains how to prevent falling victim to the flaws. Continue Reading
Why the health insurer pursues early prevention and detection strategies as part of its software security program. Continue Reading
Problem Solve Software Development Methodology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Continuous code delivery is critical in certain scenarios, but it's not always the most secure approach. Michael Cobb explains how to secure code in a continuous delivery model. Continue Reading
According to expert Gary McGraw, you're not helping yourself by believing the things -- all seven of them -- you've heard about secure software development. Continue Reading
Security gamification puts formal verification back in play. Continue Reading