Implementing an Application Security Policy: Nine Key Questions

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11
Previous Next

Click through for nine questions that should be central to implementing an application security policy in any organization, as identified by John Jacott, security evangelist for Coverity.

Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.


John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

More Slideshows

Misc50-290x195 Six Ways File-Sharing Apps Have Failed the Enterprise

Is there a real risk involved with relying on consumer-grade file-sharing and sync solutions in the enterprise, or are CIOs overreacting? ...  More >>

EvolveIPWorkFromHome0x Six Tips for Creating a Productive Work-from-Home Program

Cloud and other advanced technologies are providing organizations with better insight and new options for such things as work-from-home programs. ...  More >>

CallCenter3-190x128 How to Select a Sales Automation Solution

Sales automation solutions streamline the sales process and help sales reps work more efficiently and spend more time selling. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.