Software Integrity

Archive for the 'Maturity Model (BSIMM)' Category

 

How to reduce risk while saving on the cost of resolving security defects

Originally posted on SecurityWeek.  1. Shift Left. 2. Test earlier in the development cycle.  3. Catch flaws in design before they become vulnerabilities. These are all maxims you hear frequently in the discussion surrounding software security. If this is not your first visit to one of my columns it is certainly not the first time […]

Continue Reading...

Posted in Application Security, Maturity Model (BSIMM), Software Quality | Comments Off on How to reduce risk while saving on the cost of resolving security defects

 

How to measure software security in the healthcare industry

In 2015, healthcare became the most attacked industry, replacing financial services. Since 2010, there have been at least eight healthcare industry breaches publically reported in the media. The 2016 Cyber Security Intelligence Index states that five of the eight breaches took place during the first half of 2015. During that period, over 100 million medical […]

Continue Reading...

Posted in Healthcare Security, Maturity Model (BSIMM) | Comments Off on How to measure software security in the healthcare industry

 

Webinar: Have you learned the art of building a security strategy?

If you play a role in your organization’s software security program, you already know that there’s no shortage of things to do to improve your firm’s security activities. To bring security priorities into focus, the Building Security In Maturity Model (BSIMM) highlights the 113 most commonly observed software security activities. The BSIMM thus enables experts like […]

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on Webinar: Have you learned the art of building a security strategy?

 

How to mitigate third-party security risks

Third-party products and services are an integral part of business operations. Organizations depend heavily on optimizing their solutions by reducing costs; thus, bringing about the need for external expertise. Third-party organizations promise timely delivery of products and services, meeting compliance requirements, and optimizing the organization’s overall business performance. Reasons for bringing in a third party […]

Continue Reading...

Posted in Maturity Model (BSIMM), Security Risk Assessment, Vendor Risk Management | Comments Off on How to mitigate third-party security risks

 

7 undeniable truths to make better software security

Seven years of data gathered from 100+ initiatives provide a bird’s eye view of software security. You can apply lessons from the Building Security In Maturity Model (BSIMM) to your business regardless of your industry, your size, or the mix of your applications. How high can you soar? Learn the seven undeniable truths to make […]

Continue Reading...

Posted in Infographic, Maturity Model (BSIMM) | Comments Off on 7 undeniable truths to make better software security

 

How to benchmark your software security strategies

Evaluating the progress of your software security journey is essential, but it can be a considerable challenge. Tracking operational metrics doesn’t tell you whether you are doing the right things. Analyst reports are often too general to provide tactical direction. And companies hold their security plans so close to the vest, it makes competitive research […]

Continue Reading...

Posted in Application Security, Maturity Model (BSIMM), Threat Modeling | Comments Off on How to benchmark your software security strategies

 

3 presentations you don’t want to miss at AppSec California 2017

The Fourth Annual AppSec California Conference kicks off in one week at the Annenberg Beach House in Santa Monica, California. From January 23-25, security professionals, developers, penetration testers, and QA and testing professionals come together to share their knowledge and experiences about secure systems and secure development methodologies. We’re excited to attend the event as Platinum […]

Continue Reading...

Posted in Application Security, Maturity Model (BSIMM), Mobile Application Security, Security Conference or Event, Software Security Program Development, Threat Modeling | Comments Off on 3 presentations you don’t want to miss at AppSec California 2017

 

BSIMM7 explores emerging software security trends and evolution

BSIMM7 was released October 4th, 2016. That’s just a few weeks before the seventh annual BSIMM Community Conference convened on Amelia Island, Florida. This year’s BSIMM conference was well attended, with 160 participants representing 60 of 95 BSIMM firms from across the globe. The energy and enthusiasm at the conference was palpable. There is nothing […]

Continue Reading...

Posted in Maturity Model (BSIMM), Security Conference or Event, Software Security Testing | Comments Off on BSIMM7 explores emerging software security trends and evolution

 

BSIMM7 is now available: What’s new?

At the time of the BSIMM7 release today (October 4, 2016), the BSIMM Project has been underway for eight years. During that time, the size of the data set has multiplied over 26 times from 9 measurements to 237. Additionally, the number of firms whose software security initiatives we describe has grown from 9 to […]

Continue Reading...

Posted in Maturity Model (BSIMM), Software Security Testing | Comments Off on BSIMM7 is now available: What’s new?

 

Benefits of application security training: Moving beyond compliance

The official organizational response to a data breach almost always includes the statement: “We met all regulatory and legal requirements for data protection.” Training is required for many compliance regimes, and it might just be good enough as a compliance control. However, as a security control it’s inadequate. There are multiple major retailers that were […]

Continue Reading...

Posted in Data Breach, Maturity Model (BSIMM), Security Metrics, Security Training, Software Security Testing | Comments Off on Benefits of application security training: Moving beyond compliance