12/31/09 |
Building Security In Maturity Model, RiskPundit. |
12/30/09 |
The All-Decade Interview Team, threatpost. |
12/30/09 |
Fun Reading on Security and Compliance #22, Anton Chuvakin Blog – “Security Warrior”. |
12/28/09 |
Web Application Security Podcasts, Secweb.nerd.it blog. |
12/23/09 |
Exploiting Online Games: Cheating Massively Distributed Systems, Security Reading Room Blog. RIP |
12/15/09 |
SANS Institute to Host First Annual Application Security Focused Event and Summit, JAVA Developer’s Journal. RIP |
12/13/09 |
Coding gems 11-20, Confessions of a Chief Home Officer. |
12/01/09 |
Silver Bullet Talks with Fred Schneider, IEEE SECURITY & PRIVACY. |
11/23/09 |
looking out for lifestyle hackers in the workplace, terminal 23. RIP |
11/18/09 |
Bring Your Computer to Work Day?, 1 Raindrop. |
11/13/09 |
Best practices in information security, Continuity Central. RIP |
11/13/09 |
Interested in application (code) security?, Bloor. RIP |
11/12/09 |
Fortify Software: New Study Provides Real-World Data on Leading Software Security Initiatives in Europe, TradingMarkets.com. RIP |
11/12/09 |
Differences between EU and US attitudes to application security detailed in new report, SC Magazine. |
11/12/09 |
Cigital, Fortify tailor security model for Europe, SD Times. RIP |
11/12/09 |
New Study Provides Real-World Data on Leading Software Security Initiatives in Europe; First-ever European Maturity Model Details Success of SWIFT, Nokia and others, TMCnet.com. |
11/11/09 |
Real-world data on software security initiatives, Help Net Security. |
11/11/09 |
BSIMM Europe, Minded Security Blog. |
11/11/09 |
BSIMM Europe, Off by On. |
11/10/09 |
Hot-or-Not session over software security, Beveiliging Nieuws. |
11/10/09 |
From Biometrics to BSIMM , & “50 Hurricanes Hitting At Once!” — A Report on the Sixth Annual Partners Conference, CyBlog: Security, Privacy and Mobility in the Information Age. |
11/06/09 |
Gary McGraw on Software Security, the BSIMM Model and Critical Thinking, Digital Underground podcast. |
11/06/09 |
Gary McGraw on Software Security, the BSIMM Model and Critical Thinking, Gary McGraw on Software Security, the BSIMM Model and Critical Thinking, Threatpost |
11/05/09 |
Journal: Out of Touch with Reality I, Public Intelligence Blog. |
11/04/09 |
Lifestyle Hackers: o desafio da Net Generation, Miguel Almeida. |
11/03/09 |
Lifestyle Hackers, Hack in the Box. |
11/03/09 |
The new insider threat – lifestyle hackers, RiskPundit. RIP |
11/03/09 |
Lifestyle Hackers, Hayes on Security. RIP |
11/02/09 |
Hacking Is A Way Of Life, Dark Reading. |
11/02/09 |
Lifestyle Hackers, LinuxSecurity.com. |
11/09/09 |
Fortify: New Study Provides Real-World Data on Leading Software Security Initiatives in Europe, Global Security Mag. |
10/27/09 |
Leer denken als een hacker en programmeren als een security expert, engineersonline.nl. |
10/24/09 |
Hoff on Silver Bullet Podcast, SecuObs.com. |
10/24/09 |
Hoff on Silver Bullet Podcast, 1 Raindrop. |
10/24/09 |
Cigital’s Gary McGraw talks cloud security with Chris Hoff, IT Knowledge Exchange. |
10/22/09 |
Web application firewall use goes beyond compliance, company finds, SearchSecurity.com. |
10/22/09 |
Sicurezza Open, Il sole 24 ore. |
10/20/09 |
New Lecture Series Centers on Security Issues, UA News. |
10/12/09 |
Exploiting Online Games, TEEYAI’s Blog. RIP |
10/09/09 |
Reality Check, 1 Raindrop. |
10/08/09 |
Cigital, SANS Institute Roll Out Software Security Self-Measurement With BSIMM, DarkReading. |
09/25/09 |
Benchmarking Security – Are We Safe Yet?, John Pescatore (Gartner Blog Network). |
09/17/09 |
Is SQL Password Vulnerability A Real Threat?, Redmond Developer News. RIP |
09/16/09 |
Silver Bullet Security Podcast: Fred Schneider, Computing Now (IEEE Computer Society Newsletter). RIP |
09/15/09 |
Information Security Summit 2009 – Overview, Gartner. |
08/18/09 |
SQL Injection continues to trouble firms, lead to breaches, SearchSecurity.com. |
07/27/09 |
Book Review: Exploiting Online Games, 404 Tech Support. |
07/21/09 |
Silver Bullet Podcast Interviews Bob Blakley, Burton Group Blogs: Security and Privacy. RIP |
07/08/09 |
Suspicion Centers on N. Korea in DoS Blitz but No Smoking Gun, TechNewsWorld. |
07/01/09 |
Gov’t official: We’re serious about cybersecurity this time, ITworld. |
06/25/09 |
The Value of Static Analysis Tools, Building Real Software. |
06/22/09 |
From computer determinism to real world indeterminism, Thinking Inside a Bigger Box. |
06/20/09 |
Q&A: Twitter And Clouds, Dr. Dobb’s. |
06/10/09 |
How Microsoft Influenced Adobe Security In a Good Way, ComputerWorld. |
06/05/09 |
Summer Reading for Security Pros: Schneier or Sagan?, CSO Online. |
06/03/09 |
PayPal Software Security Podcast, cgisecurity.com. |
06/02/09 |
Xbox: Integrating Social Networks, ESET Threat Blog. RIP |
05/10/09 |
CyLab Business Risks Forum: Gary McGraw on Online Games, Electronic Voting and Software Security, CyBlog. |
04/27/09 |
Gary McGraw Interviews Virgil Gligor on Software Security and Other Vital Issues, CyLab news. |
04/24/09 |
Hacking in online games a widespread problem, FierceCIO TechWatch (also: cnet). |
04/23/09 |
Top Cybersecurity Official Spurs White House to Take Lead, TechNewsWorld. |
04/23/09 |
Hacking online games a widespread problem, cnet news. |
04/22/09 |
RSA: The fundamental challenge of security versus privacy, SC Magazine. RIP |
04/22/09 |
Experts call for better measurement of security, threatpost: digital underground. |
04/20/09 |
Secure software? Experts say it’s no longer a pipedream, cnet security news. |
04/19/09 |
Brian Chess and Gary McGraw AND-401: Building Security In Maturity Model (BSIMM), RSA Conference 365. RIP |
04/17/09 |
Gary McGraw FEA-105: Surveillance: Security, Privacy and Risk and HT2-303: Exploiting Online Games, RSA Conference 365. RIP |
04/14/09 |
RSA panel to discuss surveillance, privacy concerns, SearchSecurity.com. |
04/08/09 |
Building Security In Maturity Model (BSIMM), (ISC)2 Blog. |
04/07/09 |
Software [In]security: Nine Things Everybody Does: Software Security Activities from the BSIMM, threatpost Punditry. |
04/07/09 |
IEEE Security & Privacy Magazine Sponsors Surveillance Panel at RSA, PR Newswire (press release). RIP |
04/06/09 |
Building Security In, Maturely, Emergent Chaos. RIP |
04/03/09 |
Brad’s Reality Check Interview, ASSET (Adobe blog). |
04/01/09 |
Een maturiteitsmodel voor software security, IT Professional. RIP |
03/31/09 |
Conficker Fears Create Fertile Ground for Other Scammers, TechNewsWorld. |
03/31/09 |
An Experience-Based Maturity Model for Software Security, CERT Podcast. |
03/27/09 |
BSIMM lays out security blueprint, SDTimes. RIP |
03/27/09 |
The He Got Game Rule, 1 Raindrop. |
03/25/09 |
It B-SIMM-ply Marvelous!, Enterprise Security Blog. RIP |
03/23/09 |
SDWest, SDBestPractices, SDArch&Design: RIP, 1975 – 2009, The Blog Ride. |
03/17/09 |
First Data-Based Security Maturity Model Released, Visual Studio Magazine (also: Redmondmag.com). RIP |
03/17/09 |
First Data-Based Security Maturity Model Released, Application Development Trends. RIP |
03/13/09 |
Microsoft on ‘Building Security In Maturity Model’, Ruminations on Architecture and Security. |
03/13/09 |
Fortify & Cigital Release BSIMM — Integrating Best Practices from Nine Software Security Initiatives, CyBlog. |
03/12/09 |
Software Security Model – BSI-MM released, Mike Andrews. RIP |
03/12/09 |
Building Security In Maturity Model, The Security Development Lifecycle (MSDN). |
03/12/09 |
New report offers low-down on secure develoment, Network World. |
03/11/09 |
New report offers low-down on secure develoment, Techworld.com. RIP |
03/11/09 |
Application Security is Journey, Not a Destination, Security Incite. RIP |
03/10/09 |
Obama’s New Tech Czar, BusinessWeek. |
03/10/09 |
Maturity model offers software security yardstick, Computer Business Review (also: Computer World UK). |
03/10/09 |
Modelo de Maturidade para Segurança de Software (translate), marcelosouza.com. |
03/10/09 |
A New Hope for Software Security?, Network World (also: CSO Online). |
03/09/09 |
Political Turf Wars Drive Out US Cybersecurity Chief, TechNewsWorld. |
03/09/09 |
Building Security In Maturity Model Partly Applies to Detection and Response, TaoSecurity. |
03/06/09 |
BSI-MM est arrivé!, 1Raindrop. |
03/06/09 |
CAG, BSIMM and field-assessed security, Security Balance. RIP |
03/06/09 |
Fortify, Cigital Release Software Security Program Benchmarks, Dark Reading. |
03/06/09 |
Risks Digest 25.60, RISKS. |
03/05/09 |
Benchmarks for developing and growing an enterprise-wide software security program, Help Net Security. |
03/05/09 |
Building Security In Maturity Model, Sylvan von Stuppe. |
03/05/09 |
BSIMM: Maturing the process of Building Security In., SilverStr’s Blog. |
03/05/09 |
BSIMM lives, SC-L. |
03/04/09 |
The Building Security In Maturity Model (BSIMM), Dr. InfoSec. |
03/04/09 |
New Effort Hopes to Improve Software Security, The Wall Street Journal Blog: Digits. |
02/16/09 |
锁好数据防盗门 走出安全误区, (translate) cnet China. RIP |
02/16/09 |
Why top lists don’t work, SearchSecurity.com podcast. RIP |
02/11/09 |
Enterprise Architecture: What is a worst practice in your organization?, Enterprise Architecture: From Incite comes Insight…. |
02/09/09 |
SQL injection attacks targeting Flash, JavaScript errors, SearchSecurity.com. |
02/03/09 |
Silver Bullet Security Podcast, 1 Raindrop. |
02/03/09 |
Book Review: Exploiting Software – How to Break Code, 404 Tech Support. |
01/20/09 |
Source Code Analysis Tools: How to Choose and Use Them, CSO Online |
01/20/09 |
Spécial sécurité : politique et malware, mélange sulfureux, LeMagIT (English translation). |
01/19/09 |
Fuzzing Is Still Widely Unknown, ITworld. |
01/19/09 |
Are vulnerability lists helpful?, SearchSecurity.com Security Squad podcast. |
01/15/09 |
Gary McGraw’s Reality Check Security Podcast, The Security Development Lifecycle. |
01/15/09 |
Should states lead the charge for secure application development?, SearchSecurity.com. RIP |
01/15/09 |
OWASP Podcast Series #5. |
01/12/09 |
Reality Check, Off by On. |
01/12/09 |
Protection Poker, Emergent Chaos. RIP |
01/08/09 |
Gary McGraw and Steve Lipner, Emergent Chaos. |
01/07/09 |
Fuzzing Is A Surprise To Some, But Not To Us – Right?, Fuzzing. RIP |
11/28/08 |
TOP PC, Internet, Information Security & Identity Management Blogs!, CEOWORLD Magazine. |
11/21/08 |
Cheating, security, & theft in virtual worlds and online games, GranneBlog. |
11/18/08 |
The Economics of Finding and Fixing Vulnerabilities in Distributed Systems, 1 Raindrop. |
11/04/08 |
Lecture 07 , UCB CS 294-22 Web Security. |
10/20/08 |
Browsers getting harder and harder to secure, SearchSecurity. |
10/17/08 |
The Untapped Open Source Online Gaming Opportunity, TechNewsWorld. |
10/16/08 |
What Videogames Teach Us About Security, Forbes.com |
10/15/08 |
Browser security a concern for website development, SearchSoftwareQuality.com. |
09/22/08 |
New “Likes and Dislikes”- Based RavenWhite Password Protection Technique Helps Consumers and Businesses Thwart Email Hackers, Business Wire. |
09/16/08 |
The Chosen, System Advancements at the Monastery. |
09/16/08 |
Twenty cans of worms on the wall … (The Greek Hackers vs CERN Saga), Cyberpunk as a commodity. RIP |
09/05/08 |
Don’t ignore internal security (and don’t write passwords on Post-it’s), CIO Symmetry. |
09/05/08 |
Think like a hacker (and other World of Warcraft-inspired musings), TotalCIO. |
09/03/08 |
Multiplayer online games pose threat, FierceCIO. |
09/08 |
New Exploits at Black Hat (sidebar: “Microsoft Lays out Security MAPP”), Redmond Developer News. RIP |
08/29/08 |
Cybercrime Gets Its Game On, Forbes. |
08/25/08 |
Software Security Market, 1 Raindrop. |
08/20/08 |
Gary McGraw and Julia Allen: How to Start a Secure Software Development Program, CERT Podcast Series. |
08/19/08 |
Security outbreaks an insight 2008, Ammasajan’s Weblog. RIP |
08/18/08 |
IT School to Watch: Indiana University, ComputerWorld. |
08/12/08 |
Software security is all grown up (or at least walking on its own), Security Bytes. |
08/12/08 |
Space Race, The Secure Software Zone. |
08/08/08 |
Daniel Suarez – Daemon: Bot-Mediated Reality, The Long Now Foundation. |
08/02/08 |
锁好数据防盗门 走出安全误区 (translation), IT168.com. |
08/01/08 |
Zero tolerance for bugs, SD Times. RIP |
07/31/08 |
The state of software security, SearchSecurity.com. |
07/25/08 |
Getting Started – put Security into your SDLC, ePrivacyAwareness. RIP |
07/16/08 |
Forrester Research Security Forum 2008, September 4-5, 2008 in Boston (press release), TradingMarkets.com. RIP |
07/07/08 |
Microsoft Talks Up SDL, Application Development Trends. RIP |
07/08/08 |
In Plain Text: Exploiting Online Games, Security Management. RIP |
06/30/08 |
Exploting Online Games, Rev Dan Catt (reader review). RIP |
06/24/08 |
Yikes! Vista Security to be Obliterated!, David LeBlanc’s Web Log. |
06/17/08 |
Rise of managed security services, Security Squad podcast (13 min. in). RIP |
06/11/08 |
Financial Services Lead Spend in $650m Software Security Industry, A-TeamGroup. RIP |
06/10/08 |
Network Security Podcast, Episode 107. |
06/06/08 |
Gary McGraw on secure software development, SearchSecurity.com. |
06/06/08 |
Gary McGraw on secure software development, SearchSecurity.com. |
06/04/08 |
Protecting the Critical Infrastructure: Beware of Crimeware, BlogInfoSec.com. |
05/07/08 |
Newspapers – Yesterday’s News for Yesterday’s People, 1 Raindrop. |
05/08 |
In Search of Trust, Redmond Developer News. RIP |
04/29/08 |
What tech book are you reading right now?, Blogus Maximus. |
04/24/08 |
Payment Card Industry standard under attack?, SD Times. RIP |
04/07/08 |
Addison-Wesley Professional Showcases The New School of Information Security at RSA 2008, press release. |
03/17/08 |
Seven categories of software security flaws, ComputerWeekly.com. |
03/17/08 |
Making software secure from first principles, ComputerWeekly.com. |
03/12/08 |
Criminals step into virtual world, The Gazette (Canada). |
02/19/08 |
HiR Reading Room: Hakin9 Magazine, HiR Information Report. |
02/18/08 |
Top 10 Podcast Episodes, Eon Security Blog. RIP |
02/07/08 |
Exploiting Online Games, HiR Information Report. |
02/06/08 |
Haxx0ring 4tw, The Joshua Tree. |
02/08/08 |
Improving Software Quality, Software Quality Assurance Engineering. |
01/31/08 |
The Daily Incite – January 31, 2008, Security Incite. |
01/28/08 |
Do you see seven misunderstanding Zhendong network security (translated), CSDN. |
01/20/08 |
Online Game Security, UW Computer Security Course Blog. |
01/18/08 |
Information security makes the silver screen, Security Bites. |
01/16/08 |
The State of Security in MMORPGs, Slashdot. |
01/16/08 |
MMORPG Security, WarCry Network. |
01/15/08 |
The Daily Incite, Security Incite. |
01/12/08 |
Top 10 Tricks to exploit SQL Server Systems, Hacking Truths. |
01/10/08 |
Hacking & the Academy Awards, DarkReading. |
01/10/08 |
Software Security News, System Advancements at the Monastery. |
01/07/08 |
The Daily Incite, Security Incite. |
01/07/08 |
The New Face of Cybercrime |
01/02/08 |
Top IT Conversations Shows for December 2007, Phil Windley’s Technometria. |
01/01/08 |
Security researchers warn of dangers in online games, Massively. |
01/08 |
Best Practices to Secure Your Code, Microsoft Certified Professional Magazine (also: Redmond Developer News). RIP |