Software security engineering News
May 12, 2016
DevOps firm SourceClear wants to give DevOps engineers (now that we all agree that this is a real job title) more tools to help find vulnerabilities in open-source code. The firm’s eponymously ...
October 26, 2015
Get the latest updates from JavaOne 2015 as the conference is happening. This guide covers the highlights from this year's annual conference.
October 16, 2015
Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.
August 27, 2015
An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.
Software security engineering Get Started
Bring yourself up to speed with our introductory content
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics. Continue Reading
Microsoft's Insider Program lets members choose from two different update rings -- a fast and a slow speed -- to get OS updates on their Windows 10 machines. Continue Reading
Just Enough Administration restricts administrative access to the bare necessities for user tasks, giving organizations more control over security. Continue Reading
Evaluate Software security engineering Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Open source collaboration can be rife with risk. Learn about the open source security requirements to consider and who should be responsible for security and support. Continue Reading
Application containers can be a major asset for deploying mobile and Web applications. Expert Michael Cobb explains what enterprises need to know about containerization. Continue Reading
Expert Ed Tittel examines WatchGuard UTM appliances that bundle different kinds of network infrastructure protection into a single device for small, midsize and large businesses. Continue Reading
Manage Software security engineering
Learn to apply best practices and optimize your operations.
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security missteps, it's essential to plan early and carefully.
This handbook looks at various secure testing strategies to ensure software safety now. In the first article, Gerie Owen covers the basic security measures to avoid getting hacked and advocates the importance of thinking like a hacker. In part two, Valerie Silverthorne views security from an Agile development perspective and examines how to reduce software vulnerabilities. Finally, Amy Reichert-Browerstock closes out the handbook with website penetration testing techniques for a regular testing cycle and how to check for security defects at the start of a test cycle. Guarantee protected software with these security actions.Continue Reading
To get the most out cloud, organizations need to rethink the app development process. Expert Tom Nolle offers three ways to get started. Continue Reading
Why the health insurer pursues early prevention and detection strategies as part of its software security program. Continue Reading
Problem Solve Software security engineering Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A new iOS flaw could allow attackers to conduct directory traversal attacks on AirDrop-enabled devices. Nick Lewis explains how enterprises should handle the threat. Continue Reading
According to expert Gary McGraw, you're not helping yourself by believing the things -- all seven of them -- you've heard about secure software development. Continue Reading
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading