String and hybrid analysis are designed to address vulnerabilities at earliest stage of development … continue reading
Titus Metadata Security for SharePoint allows permissions to be assigned based on the recipient’s Active Directory properties … continue reading
Ruminations on maximizing your Twitter profile, business intelligence as a predictor, and what Stuxnet means for security … continue reading
The IT security industry is finding new ways to survive and thrive in today’s market … continue reading
The growth of e-commerce has revealed that fraud detection is an under-emphasized area, which presents a growth opportunity … continue reading
CodeArmor Intelligence 3.0 also uses Salesforce’s Chatter collaboration features to assist in security decision-making … continue reading
New language used to create provably correct cryptographic hash function algorithm is released as open source … continue reading
The editors are glad to see security being discussed at conferences; ScrumMaster certification should be made more stringent … continue reading
Attendees give a wide variety of ideas about the subject, with Rex Black adding in some of his own … continue reading
The jointly created product helps development teams and security teams collaborate on software projects … continue reading
Tests can be run at any point in the development life cycle by using SecurityReview’s Upload APIs … continue reading
IBM’s Ryan Berg has written a white paper that lists five vulnberabilities that face application security efforts … continue reading