New & Notable
Building security into the SDLC (Software development life cycle) News
December 17, 2010
What are the important considerations of a requirements management tool when developing embedded software for a medical device? In this Q&A with IntraPace software development manager Mace Volzing, SSQ asks about managing requirements for the ...
November 03, 2010
In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not ...
August 24, 2009
GatherSpace version 2 is now available and continues to offer low-cost software requirements gathering technology that is easily learned and easily implemented. According to GatherSpace founder Darren Levy, "It's painlessly easy to use, and an ...
August 20, 2009
The ALM tool market is in an uproar as countless acquisitions, trends and shifts have altered the way in which application lifecycles are monitored industry experts explain situation.
Building security into the SDLC (Software development life cycle) Get Started
Bring yourself up to speed with our introductory content
Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important concern during development as ... Continue Reading
SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. Continue Reading
Code review is a broad security concept and those looking at this option for compliance will find plenty of expert information on the types of code review in this section of the guide. Continue Reading
Evaluate Building security into the SDLC (Software development life cycle) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The importance of building secure applications is well established. And yet software developers graduating with degrees in computer science often lack application security training. Why is that so, and what can be done to remedy this situation? Continue Reading
For an enterprise application, assuming our development team does lots of little changes (in two- to three-week iterations), how frequently should we do a comprehensive security examination? Continue Reading
Software testing expert Amy Reichert walks through the importance of MAM tools and options for developers looking for one. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Building security into the SDLC (Software development life cycle)
Learn to apply best practices and optimize your operations.
Different mobile platforms have different security characteristics. What's the best way for mobile developers to deal with this? Continue Reading
What is the single most important application security best practice for mobile developers? Security expert Kevin Beaver provides an answer. Continue Reading
How do testers manage and prioritize the security software vulnerabilities they find when security-testing software? Continue Reading
Problem Solve Building security into the SDLC (Software development life cycle) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Our business is relying more and more on smart process applications to manage business-critical processes. This means application security is even more important than ever. What's your advice on ensuring not only that the code is secure, but that ... Continue Reading
Can security impact application performance? One expert examines common application security vulnerabilities that might be slowing you down. Continue Reading
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading