Home > Articles > Security > General Security and Privacy
General Security and Privacy
33 Items
Sort by Date | Title
- Software [In]security: Software Security Top 10 Surprises
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Dec 15, 2008
- In the course of analyzing real-world data from top software security firms, Gary McGraw, Brian Chess, and Sammy Migues unearthed some surprises.
|
- Software [In]security: Software Security Training
-
By
Gary McGraw, Sammy Migues
- Oct 31, 2011
- Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
|
- Software [In]security: Software Security Zombies
-
By
Gary McGraw
- Jul 21, 2011
- Software security expert Gary McGraw reviews some of the most important security concepts — before they eat your (network's) brains.
|
- Software [In]security: Startup Lessons
-
By
Gary McGraw
- Oct 22, 2009
- Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
|
- Software [In]security: Technology Transfer
-
By
Gary McGraw
- Oct 26, 2010
- Gary McGraw discusses the evolution of a source code scanning tool from research project to commercial project and details the transfer of technology that made it all happen.
|
- Software [In]security: The Smart (Electric) Grid and Dumb Cybersecurity
-
By
Gary McGraw
- Mar 26, 2010
- Security expert Gary McGraw explains why the rush to upgrade our power grid may lead to security vulnerabilities in critical infrastructure.
|
- Software [In]security: Third-Party Software and Security
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Nov 30, 2011
- How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
|
- Software [In]security: Top 11 Reasons Why Top 10 (or Top 25) Lists Don’t Work
-
By
Gary McGraw
- Jan 13, 2009
- Gary McGraw explains why there’s more to software security than watching the bug parade march by.
|
- Software [In]security: vBSIMM (BSIMM for Vendors)
-
By
Gary McGraw, Sammy Migues
- Apr 12, 2011
- How do you ensure that your third-party software vendors practice good software security? Software security expert Gary McGraw explains how the Building Security In Maturity Model can play a central role in this effort.
|
- Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
-
By
Gary McGraw, Sammy Migues
- Jan 26, 2012
- Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
|
- Software [In]security: What Works in Software Security
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Feb 26, 2010
- 15 of the 110 activities in the BSIMM are very commonly observed. Gary McGraw, Brian Chess, and Sammy Migues list and explain these activities.
|
- Software [In]security: You Really Need a Software Security Group
-
By
Gary McGraw
- Dec 21, 2009
- Gary McGraw explains why having a software security group is necessary for a software security initiative.
|
- Visualization: How to Present Security Data to Get Your Point Across
-
By
Andrew Jaquith
- Dec 21, 2007
- Learn how to present security data in a style that truly gets your point across.
|