Implementing an Application Security Policy: Nine Key Questions

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11
Next Next

Create recognition programs for secure innovation and build cooperation between development groups (i.e., a scoreboard of flaws / defects fixed and award the teams that fix the most, or even just a movie / beer / pizza night with peers). It’s a great way to incentivize security and make it a priority across the board.

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.

John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

PneuronAnalyticsPurpose0x Capitalizing on Big Data: Analytics with a Purpose

As these emerging technologies continue to race ahead, there is an unprecedented opportunity to harvest those data streams and generate incredible new insights. ...  More >>

mobile54-190x128 Five Ways to Stay Productive While Working Remotely

There's no magic bullet, but the essentials are to make sure to have the right tools at your disposal while on the move to communicate with your teams in ways that fit your needs, as well as being flexible, clear and direct in your communication. ...  More >>

mobile53-290x195 To SaaS or Not to SaaS: 2015 Enterprise App Outlook

While businesses have been slower to move enterprise apps to the cloud (only a third are currently using cloud-based enterprise apps), it's not due to a lack of wanting. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date