Secure Design: Threat Modeling

il y a 7 ans 2680 Vues

Getting Executive Support for a Software Security Program

il y a 7 ans 454 Vues

Handle With Care: You Have My VA Report!

il y a 7 ans 1130 Vues

Can You Really Automate Yourself Secure

il y a 7 ans 352 Vues

How to Choose the Right Security Training for You

il y a 7 ans 292 Vues

6 Most Common Threat Modeling Misconceptions

il y a 7 ans 828 Vues

Video Game Security

il y a 7 ans 1719 Vues

Get Your Board to Say "Yes" to a BSIMM Assessment

il y a 7 ans 442 Vues

Software Security Metrics

il y a 7 ans 3684 Vues

Cyber War, Cyber Peace, Stones, and Glass Houses

il y a 7 ans 254 Vues

The Path to Proactive Application Security

il y a 8 ans 1132 Vues

BSIMM: Bringing Science to Software Security

il y a 8 ans 1196 Vues

BSIMM-V: The Building Security In Maturity Model

il y a 8 ans 1727 Vues

How to Avoid the Top Ten Software Security Flaws

il y a 9 ans 869 Vues