Implementing an Application Security Policy: Nine Key Questions

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Implementing an Application Security Policy: Nine Key Questions-6 Next

Nobody wants to be “That Guy” – the one that sits in on every meeting and insists that everything be “securely architected.” In truth, most applications are rarely “architected.” They’re grown/innovated via agile or waterfall methods. Instead, we need to show developers, early and often, the consequences of poor security, and let them start thinking about it. Most “security architects” are ineffective because they do not deputize their constituents and empower them to create more secure applications on their own. Jacott is not saying don’t perform architectural reviews. He is saying teach them how and become part of the development effort.

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.

John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.