Building security into the SDLC Software development life cycle
- September 13, 2017
Low-code software development platforms are proliferating rapidly, even as headline-grabbing security breaches continue. Here's how they can help make software safer.
- May 11, 2016
It's a scary world out there, but developers are in a rush to release. SourceClear Open gives developers the tools to make open source code projects more secure for free.
- April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
- December 17, 2010
What are the important considerations of a requirements management tool when developing embedded software for a medical device? In this Q&A with IntraPace software development manager Mace Volzing, SSQ asks about managing requirements for the ...
- November 03, 2010
In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not ...
- August 24, 2009
GatherSpace version 2 is now available and continues to offer low-cost software requirements gathering technology that is easily learned and easily implemented. According to GatherSpace founder Darren Levy, "It's painlessly easy to use, and an ...
- August 20, 2009
The ALM tool market is in an uproar as countless acquisitions, trends and shifts have altered the way in which application lifecycles are monitored industry experts explain situation.
- March 09, 2009
Bring the quality assurance department's many resources into the software testing process from the get-go, one expert advises, and watch common software development problems dissolve.
- December 08, 2008
SAFECode's guide to secure software development provides practices for all stages of the software development lifecycle proven to improve software security.
- October 15, 2008
The number of Web browsers and the rise of sophisticated attacks against them, such as cross-site request forgery and clickjacking, complicate website development, security, and testing.
- May 19, 2008
If you need to comply with the application security regulation of the PCI Data Security Standard, should you opt for code reviews or a Web application firewall? Experts offer their opinions.
- March 27, 2008
The revelation that pacemakers can be hacked illustrates how software makers have to start thinking differently about application security and quality.
- January 28, 2008
In the continuing drive to address quality and security earlier in the software development lifecycle (SDLC), two thought leaders in the automated source code analysis market -- Klocwork and Ounce Labs -- are targeting new releases at the developer.
- November 28, 2007
Security needs to become a way of life in application development, Microsoft's Michael Howard says. In this Q&A he explains how you need to use tools and educate people to make sure your applications aren't weak links.
- October 15, 2007
Securent's Entitlement Management Solution helps Wachovia enforce fine-grained application security, restricting who can do what once inside an application. More than that, it relieves developers from having to develop and deploy custom access ...