Software security assurance

Results: 433



#Item
171Data security / Software testing / Computer network security / National security / Information security management system / Application security / Vulnerability / Threat model / Security testing / Computer security / Security / Cyberwarfare

Be ta SOFTWARE ASSURANCE MATURITY MODEL V0.8 BETA

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2010-08-18 10:28:34
172Data security / Software quality / Software testing / Information security management system / Software security assurance / Software assurance / Vulnerability / Application security / Quality assurance / Security / Computer security / Cyberwarfare

Software Assurance Maturity Model A guide to building security into software development Version - 1.0 For the latest version and additional info, please see the project web site at

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2010-08-18 10:28:34
173Data security / Software testing / Computer network security / National security / Information security management system / Application security / Vulnerability / Threat model / Security testing / Computer security / Security / Cyberwarfare

Be ta SOFTWARE ASSURANCE MATURITY MODEL V0.8 BETA

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2010-08-18 10:28:34
174Computer network security / United States Department of Homeland Security / Hacking / National security / National Cyber Security Division / Vulnerability / Software assurance / Conficker / Attack / Computer security / Cyberwarfare / Security

Commerce National Defense Public/Private Collaboration Efforts for Software Supply Chain Risk Management

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:44
175EJBCA / Java enterprise platform / Public-key cryptography / Key management / Data security / Common Criteria / Evaluation Assurance Level / Digital signature / Biometric passport / Cryptography / Evaluation / Security

PrimeKey PRIMEKEY SOLUTIONS AB INNOVATIVE SOFTWARE NETWORKING CONFERENCE  Admir Abdurahmanovic VP, co-founder

Add to Reading List

Source URL: www.swii.org

Language: English - Date: 2014-09-23 14:56:34
176Computer network security / Crime prevention / National security / Data security / Vulnerability / Software assurance / Application security / Software quality / Software development process / Security / Cyberwarfare / Computer security

Addressing Software Security in the Federal Acquisition Process Cigital Federal, Inc. 14 January 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
177ISO standards / Computer security / Altran Praxis / Evaluation Assurance Level / National Security Agency / Common Criteria / Copyright law of the United States / Integrity / Smart card / Evaluation / Ethics / Security

p Industrial case study: Zero defect secure software for the National Security Agency

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 11:59:08
178Computer network security / Software quality / OWASP / Software testing / Application security / Vulnerability / Software security assurance / Software assurance / Threat model / Cyberwarfare / Computer security / Security

OWASP SAMM Best Practices, Lessons from the Trenches Seba Deleersnyder [removed] OpenSAMM project co-leader

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:46:23
179Crime prevention / National security / Computer security / Software assurance / Software development process / Application security / Software bug / Capability Maturity Model Integration / Requirement / Software development / Software quality / Computer network security

What can an Acquirer do to prevent developers from make dangerous software errors? OWASP AppSec DC 2012 April 5, 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:59:35
180Software testing / Credit cards / Data privacy / Penetration test / Information security / Payment Card Industry Data Security Standard / Software quality / Security awareness / Quality assurance / Computer security / Security / Computing

Training: the secret to ongoing compliance by Sammy Migues, Director, Knowledge Management and Training July 24, 2007 Ongoing compliance requires ongoing training Hundreds of thousands of companies around the

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
UPDATE