Building security into the SDLC (Software development life cycle) News
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
December 17, 2010
What are the important considerations of a requirements management tool when developing embedded software for a medical device? In this Q&A with IntraPace software development manager Mace Volzing, SSQ asks about managing requirements for the ...
November 03, 2010
In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not ...
August 24, 2009
GatherSpace version 2 is now available and continues to offer low-cost software requirements gathering technology that is easily learned and easily implemented. According to GatherSpace founder Darren Levy, "It's painlessly easy to use, and an ...
Building security into the SDLC (Software development life cycle) Get Started
Bring yourself up to speed with our introductory content
For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin? Continue Reading
Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important concern during development as ... Continue Reading
SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Building security into the SDLC (Software development life cycle) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Is it safe to move from on-premises application lifecycle management tools to cloud-based tools? Read this expert answer to find out. Continue Reading
A recent survey shows software professionals have a basic understanding of application security concepts, but they lack the knowledge to fix the resulting security issues. Continue Reading
The importance of building secure applications is well established. And yet software developers graduating with degrees in computer science often lack application security training. Why is that so, and what can be done to remedy this situation? Continue Reading
Manage Building security into the SDLC (Software development life cycle)
Learn to apply best practices and optimize your operations.
Discovering project requirements can be challenging. An expert offers elicitation techniques you can use to discover business and software requirements. Continue Reading
Different mobile platforms have different security characteristics. What's the best way for mobile developers to deal with this? Continue Reading
What is the single most important application security best practice for mobile developers? Security expert Kevin Beaver provides an answer. Continue Reading
Problem Solve Building security into the SDLC (Software development life cycle) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Our business is relying more and more on smart process applications to manage business-critical processes. This means application security is even more important than ever. What's your advice on ensuring not only that the code is secure, but that ... Continue Reading
Can security impact application performance? One expert examines common application security vulnerabilities that might be slowing you down. Continue Reading
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading