Many software developers are cribbing code, and its flaws, that someone else created. And the problem is only getting harder to keep up with.
The days of patching software aren't going away, but they are changing. While operating systems are less vulnerable than ever, cyber-criminals have moved on ...
Mike Mimoso talks to Cigital's Gary McGraw about software security and analysis from the sixth version of the Building Security in Maturity Model report.
Formal methods can verify almost any property about a piece of software, but tools must trade precision against the scale of the software.
Any successful engineering endeavor requires a strong relationship between engineers and clients. Similarly, the success of a software security assurance program hinges on a key relationship: one between security and software engineering teams.
You've installed antivirus, a VPN, and other security software on your PC, phones, and tablets, but how do you know if it's doing its thing to keep you safe? We have a dozen tips to help you perform your own security checkup.
Verizon's April Wright outlined a new paradigm for integrating developers with offensive and defensive teams to fight software vulnerabilities.
Everybody has a different pattern of veins in the whites of their eyes. New security software makes use of that.
You can have the most sophisticated computer security in the world and it won’t always protect you. That’s because hackers, more and more, are attacking the weakest link in your cybersecurity—your end users. It’s called social engineering. And it’s a serious problem.
Physical security of computers involves the protection of hardware, personnel, software, networks, and data against any physical actions or events which may cause damage or loss to an institution, ent...