Big data

Software security engineering News

  • October 26, 2015 26 Oct'15

    News from JavaOne 2015

    Get the latest updates from JavaOne 2015 as the conference is happening. This guide covers the highlights from this year's annual conference.

  • October 16, 2015 16 Oct'15

    Automating security, privacy in software programming

    Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.

  • August 27, 2015 27 Aug'15

    CISOs: Application security programs need improvements

    An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.

  • July 06, 2015 06 Jul'15

    Masergy's NFV platform: An app store for virtual network functions

    Masergy's new NFV platform acts like an app store for virtual network functions. One possible hurdle: Convincing enterprises the software is secure.

View All News

Software security engineering Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Software security engineering Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Software security engineering

Learn to apply best practices and optimize your operations.

  • Secure testing: Making software safe

    Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security missteps, it's essential to plan early and carefully.

    This handbook looks at various secure testing strategies to ensure software safety now. In the first article, Gerie Owen covers the basic security measures to avoid getting hacked and advocates the importance of thinking like a hacker. In part two, Valerie Silverthorne views security from an Agile development perspective and examines how to reduce software vulnerabilities. Finally, Amy Reichert-Browerstock closes out the handbook with website penetration testing techniques for a regular testing cycle and how to check for security defects at the start of a test cycle. Guarantee protected software with these security actions.

     Continue Reading

  • Three ways to make your app development process cloud-ready

    To get the most out cloud, organizations need to rethink the app development process. Expert Tom Nolle offers three ways to get started. Continue Reading

  • Marcus Ranum Q&A: Aetna CSO Jim Routh on Agile security testing and challenges

    Why the health insurer pursues early prevention and detection strategies as part of its software security program. Continue Reading

View All Manage

Problem Solve Software security engineering Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close