New & Notable
Building security into the SDLC (Software development life cycle) News
December 17, 2010
What are the important considerations of a requirements management tool when developing embedded software for a medical device? In this Q&A with IntraPace software development manager Mace Volzing, SSQ asks about managing requirements for the ...
November 03, 2010
In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not ...
August 24, 2009
GatherSpace version 2 is now available and continues to offer low-cost software requirements gathering technology that is easily learned and easily implemented. According to GatherSpace founder Darren Levy, "It's painlessly easy to use, and an ...
August 20, 2009
The ALM tool market is in an uproar as countless acquisitions, trends and shifts have altered the way in which application lifecycles are monitored industry experts explain situation.
Building security into the SDLC (Software development life cycle) Get Started
Bring yourself up to speed with our introductory content
Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important concern during development as ... Continue Reading
SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. Continue Reading
Code review is a broad security concept and those looking at this option for compliance will find plenty of expert information on the types of code review in this section of the guide. Continue Reading
Evaluate Building security into the SDLC (Software development life cycle) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Software testing expert Amy Reichert walks through the importance of MAM tools and options for developers looking for one. Continue Reading
Organizations need to explicitly address security and application performance during the requirements management process according to expert Dan Cornell. Continue Reading
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves... Continue Reading
Manage Building security into the SDLC (Software development life cycle)
Learn to apply best practices and optimize your operations.
Software systems security expert Dan Cornell discusses the challenges and processes that come with the integration in smart process applications. Continue Reading
Developers without a security expert often rely on a third-party testing service. Software expert Dan Cornell provides some tips for the search. Continue Reading
Software development expert Dan Cornell discusses security issues, like third parties and data entering the application, found in social apps. Continue Reading
Problem Solve Building security into the SDLC (Software development life cycle) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading
Expert Michael Cobb details how to argue for a multistep secure code review process like the Microsoft SDL, and the pros of secure coding practices. Continue Reading
QA/test role does not just belong to the test manager. In the whole team approach, the responsibility is spread throughout the team. Continue Reading