OWASP Security Spending Benchmarks Project

OWASP Security Spending Benchmarks Project

Date: Mar 27, 2009
An ongoing OWASP project investigates company spending on software development. Boaz Gelbord, executive director of information security at Wireless Generation Inc., organized the report with Jeremiah Grossman, chief technology officer of WhiteHat Security Inc. In this video, Gelbord explains some of the survey findings. A majority of companies surveyed are getting an independent third-party security review of software code, Gelbord said. He was interviewed at SecureWorld Boston Expo 2009 by SearchSecurity.com News Editor, Robert Westervelt.

More on Security Resources

  • canderson

    Adobe: Increasing transparency and the secure product lifecycle

    VIDEO - Brad Arkin discusses why Adobe created his role, how it engages the security research community and how Adobe has learned that talking about security isn't a bad thing.
  • canderson

    201 CMR 17 compliance: What you need to know

    VIDEO - The new Massachusetts data protection law, 201 CMR 17, is known as one of the most stringent laws of its kind. In this interview, David Navetta of the Information Law Group discusses how enterprises should approach compliance with this law.
  • COBIT

    Definition - COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.
  • distributed denial-of-service attack (DDoS)

    Definition - On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.
  • computer forensics (cyber forensics)

    Definition - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • multifactor authentication (MFA)

    Definition - Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued)
  • attack vector

    Definition - An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome.