Implementing an Application Security Policy: Nine Key Questions

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Next

Create recognition programs for secure innovation and build cooperation between development groups (i.e., a scoreboard of flaws / defects fixed and award the teams that fix the most, or even just a movie / beer / pizza night with peers). It’s a great way to incentivize security and make it a priority across the board.

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.

John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

email9-190x128 How to Get Control of Your Email Inbox

Email is an integral part of working, but for far too many workers, it hurts rather than helps their productivity. ...  More >>

DataM46-190x128 Automating the Intelligence of Business Intelligence

Automated business intelligence can provide business users faster, more accurate insights into an increasingly overwhelming amount of data. ...  More >>

BreakThroughTechSoftwareUpdate0x Six Warning Signs You've Outgrown Your Software

Despite their importance, many SMBs let their tech solutions languish and turn into outdated relics that can't offer the necessary speed, collaboration and functionality for the modern user or customer. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.