- Software [In]security: Software Security Top 10 Surprises
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Dec 15, 2008
- In the course of analyzing real-world data from top software security firms, Gary McGraw, Brian Chess, and Sammy Migues unearthed some surprises.
|
- Software [In]security: Software Security Training
-
By
Gary McGraw, Sammy Migues
- Oct 31, 2011
- Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
|
- Software [In]security: Software Security Zombies
-
By
Gary McGraw
- Jul 21, 2011
- Software security expert Gary McGraw reviews some of the most important security concepts — before they eat your (network's) brains.
|
- Software [In]security: Startup Lessons
-
By
Gary McGraw
- Oct 22, 2009
- Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
|
- Software [In]security: Technology Transfer
-
By
Gary McGraw
- Oct 26, 2010
- Gary McGraw discusses the evolution of a source code scanning tool from research project to commercial project and details the transfer of technology that made it all happen.
|
- Software [In]security: The Smart (Electric) Grid and Dumb Cybersecurity
-
By
Gary McGraw
- Mar 26, 2010
- Security expert Gary McGraw explains why the rush to upgrade our power grid may lead to security vulnerabilities in critical infrastructure.
|
- Software [In]security: Third-Party Software and Security
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Nov 30, 2011
- How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
|
- Software [In]security: Top 11 Reasons Why Top 10 (or Top 25) Lists Don’t Work
-
By
Gary McGraw
- Jan 13, 2009
- Gary McGraw explains why there’s more to software security than watching the bug parade march by.
|
- Software [In]security: vBSIMM (BSIMM for Vendors)
-
By
Gary McGraw, Sammy Migues
- Apr 12, 2011
- How do you ensure that your third-party software vendors practice good software security? Software security expert Gary McGraw explains how the Building Security In Maturity Model can play a central role in this effort.
|
- Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
-
By
Gary McGraw, Sammy Migues
- Jan 26, 2012
- Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
|
- Software [In]security: What Works in Software Security
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Feb 26, 2010
- 15 of the 110 activities in the BSIMM are very commonly observed. Gary McGraw, Brian Chess, and Sammy Migues list and explain these activities.
|
- Software [In]security: You Really Need a Software Security Group
-
By
Gary McGraw
- Dec 21, 2009
- Gary McGraw explains why having a software security group is necessary for a software security initiative.
|
- Software Architecture: The Difference between Marketecture and Tarchitecture
-
By
Luke Hohmann
- Jun 6, 2003
- Luke Hohmann clarifies how the marketing and technical aspects of the software architecture system must work together to achieve business objectives.
|
- Software Complexity: How Do We Bring Order to Chaos?
-
By
Bobbi J. Young, Grady Booch, Jim Conallen, Michael W. Engel, Kelli A. Houston, Robert A. Maksimchuk
- Nov 30, 2007
- Object-oriented analysis and design provides structure and methodology for understanding the complexities of modern software.
|
- Software Development: Dismantling the Waterfall
-
By
Pete McBreen
- Feb 8, 2002
- Of all the ways of approaching the software development lifecycle, the waterfall is probably the worst. So why does it continue to dominate our thinking? Simple: We have failed to let everyone know how software development really works.
|
- Software Systems Architecture: Viewpoints and Views
-
By
Nick Rozanski, Eóin Woods
- Nov 10, 2011
- Capturing the essence and the detail of the whole architecture in a single model is just not possible for anything other than simple systems. By far the best way of managing this complexity is to produce a number of different representations of all or part of the architecture, each of which focuses on certain aspects of the system, showing how it addresses some of the stakeholder concerns.
|
- Software Verification and Validation in High Assurance Agile Development: Ground Rules
-
By
Dean Leffingwell
- Dec 21, 2010
- How do you develop high quality software in regulated (and other high assurance, high economic cost of failure) environments in an agile manner? Dean Leffingwell explores the ground rules.
|
- Steve Vinoski on the 15th Anniversary of Design Patterns
-
By
Steve Vinoski
- Oct 23, 2009
- Steve Vinoski shares his thoughts about Design Patterns: Elements of Reusable Object-Oriented Software on the 15th anniversary of its publication.
|
- Style Guide for The MMIX Supplement: Supplement to The Art of Computer Programming Volumes 1, 2, 3 by Donald E. Knuth
-
By
Martin Ruckert
- Feb 18, 2015
- Martin Ruckert, author of The MMIX Supplement: Supplement to The Art of Computer Programming Volumes 1, 2, 3 by Donald E. Knuth , offers a programming style guide, covering names, temporaries, index variables, register numbers, local name spaces, and instruction counts.
|
- Succeeding with Agile Software Development Using Scrum: Team Structure
-
By
Mike Cohn
- Dec 1, 2009
- In this chapter Mike Cohn looks at the importance of two critical factors to be considered when deciding how to structure Scrum teams: keeping teams small and orienting each team around the delivery of end-to-end user-visible functionality
|