Building security into the SDLC (Software development life cycle)

Building security into the SDLC (Software development life cycle) News

  • December 17, 2010 17 Dec'10

    Requirements management with embedded software: Interview with IntraPace

    What are the important considerations of a requirements management tool when developing embedded software for a medical device? In this Q&A with IntraPace software development manager Mace Volzing, SSQ asks about managing requirements for the ...

  • November 03, 2010 03 Nov'10

    Glitch author seeks mandated software quality controls

    In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not ...

  • August 24, 2009 24 Aug'09

    GatherSpace beefs up cloud-based requirements management

    GatherSpace version 2 is now available and continues to offer low-cost software requirements gathering technology that is easily learned and easily implemented. According to GatherSpace founder Darren Levy, "It's painlessly easy to use, and an ...

  • August 20, 2009 20 Aug'09

    ALM: Best of breed vs. complete systems

    The ALM tool market is in an uproar as countless acquisitions, trends and shifts have altered the way in which application lifecycles are monitored industry experts explain situation.

View All News

Building security into the SDLC (Software development life cycle) Get Started

Bring yourself up to speed with our introductory content

  • application security

    Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important concern during development as ... Continue Reading

  • SQL injection

    SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. Continue Reading

  • PCI DSS compliance: Code review

    Code review is a broad security concept and those looking at this option for compliance will find plenty of expert information on the types of code review in this section of the guide. Continue Reading

View All Get Started

Evaluate Building security into the SDLC (Software development life cycle) Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Building security into the SDLC (Software development life cycle)

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Building security into the SDLC (Software development life cycle) Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close