Implementing an Application Security Policy: Nine Key Questions

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11
Previous Next

Click through for nine questions that should be central to implementing an application security policy in any organization, as identified by John Jacott, security evangelist for Coverity.

Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.


John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

More Slideshows

Analytics8-290x195 Four Steps to Ensure Your Big Data Investment Pays Off

Big Data became the buzzword du jour to describe the vast collection of information that could be synthesized and used to help us make smarter decisions faster. But how do we profit from it? ...  More >>

infra21-190x128 What International Conferencing Trends Tell Us About the World

The conference call is a common business practice across the globe. But can conferencing usage help us learn about cultural trends? ...  More >>

Social5-290x195 Four Ways to Unlock Value from the Internet of Things

IoT examples can be categorized into four basic usage scenarios, each of which presents clear business opportunities for end-user organizations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.