Implementing an Application Security Policy: Nine Key Questions

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11
Previous Next

Click through for nine questions that should be central to implementing an application security policy in any organization, as identified by John Jacott, security evangelist for Coverity.

Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

There has been a lot of news lately about high-profile attacks on Web applications. Hackers employ tactics like cross-site scripting (XSS) and SQL injections, which have been around for more than 20 years. Yet, both are prevalent attack vectors now more than ever before - which makes it that much more important for organizations to have a formalized application security policy for their developer teams.


John Jacott, security evangelist for Coverity, which offers a development testing platform, sheds some insight on nine important questions that should be central to implementing an application security policy in any organization.

 

More Slideshows

infra21-190x128 What International Conferencing Trends Tell Us About the World

The conference call is a common business practice across the globe. But can conferencing usage help us learn about cultural trends? ...  More >>

Social5-290x195 Four Ways to Unlock Value from the Internet of Things

IoT examples can be categorized into four basic usage scenarios, each of which presents clear business opportunities for end-user organizations. ...  More >>

Analytics7-290x195 Six Big Business Intelligence Mistakes

If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective one. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.