Implementing an Application Security Policy: Nine Key Questions

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11
Next Next

Create recognition programs for secure innovation and build cooperation between development groups (i.e., a scoreboard of flaws / defects fixed and award the teams that fix the most, or even just a movie / beer / pizza night with peers). It’s a great way to incentivize security and make it a priority across the board.

Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.


John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

More Slideshows

Social5-290x195 Four Ways to Unlock Value from the Internet of Things

IoT examples can be categorized into four basic usage scenarios, each of which presents clear business opportunities for end-user organizations. ...  More >>

Analytics7-290x195 Six Big Business Intelligence Mistakes

If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective one. ...  More >>

Analytics6-290x195 Big Data Certification and Training Options on the Rise

With as many as 50 percent of IT pros having to pay for their own education, let's look at a range of online and free online training resources. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.