Implementing an Application Security Policy: Nine Key Questions

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11
Previous Next

Click through for nine questions that should be central to implementing an application security policy in any organization, as identified by John Jacott, security evangelist for Coverity.

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.

John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

ZettasetBigDataAutomation0x Five Ways Automation Speeds Up Big Data Deployments

As enterprises move Hadoop from pilot to production environments, they are finding the "on-boarding" process slow and complicated. ...  More >>

DataM26-290x195 Overcoming Five Managed File Transfer Myths

Despite the rapid growth and adoption of the technology, several misconceptions about MFT and its benefits still exist today. Here are the five primary misconceptions regarding MFT. ...  More >>

ShapiroMarketRevolution0x Five Revolutions that Will Shape the Future of Marketing

Everyone in marketing should be aware of several horizon-level revolutions, because they are about to be felt with a force that is difficult to overstate. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Close
Thanks for your registration, follow us on our social networks to keep up-to-date