Wireless networks

Software security engineering News

  • May 12, 2016 12 May'16

    SourceClear on DevOps: forget tools that generate more noise than signal

    DevOps firm SourceClear wants to give DevOps engineers (now that we all agree that this is a real job title) more tools to help find vulnerabilities in open-source code. The firm’s eponymously ...

  • October 26, 2015 26 Oct'15

    News from JavaOne 2015

    Get the latest updates from JavaOne 2015 as the conference is happening. This guide covers the highlights from this year's annual conference.

  • October 16, 2015 16 Oct'15

    Automating security, privacy in software programming

    Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.

  • August 27, 2015 27 Aug'15

    CISOs: Application security programs need improvements

    An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.

View All News

Software security engineering Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Software security engineering Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Software security engineering

Learn to apply best practices and optimize your operations.

  • Secure testing: Making software safe

    Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security missteps, it's essential to plan early and carefully.

    This handbook looks at various secure testing strategies to ensure software safety now. In the first article, Gerie Owen covers the basic security measures to avoid getting hacked and advocates the importance of thinking like a hacker. In part two, Valerie Silverthorne views security from an Agile development perspective and examines how to reduce software vulnerabilities. Finally, Amy Reichert-Browerstock closes out the handbook with website penetration testing techniques for a regular testing cycle and how to check for security defects at the start of a test cycle. Guarantee protected software with these security actions.

     Continue Reading

  • Three ways to make your app development process cloud-ready

    To get the most out cloud, organizations need to rethink the app development process. Expert Tom Nolle offers three ways to get started. Continue Reading

  • Marcus Ranum Q&A: Aetna CSO Jim Routh on Agile security testing and challenges

    Why the health insurer pursues early prevention and detection strategies as part of its software security program. Continue Reading

View All Manage

Problem Solve Software security engineering Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close