Software Integrity Blog

Archive for the 'Maturity Model (BSIMM)' Category

 

Fault Injection Podcast: Sammy Migues introduces BSIMM8

Fault Injection is a podcast from Synopsys that digs deep into software quality and security issues. This week, hosts Robert Vamosi, CISSP and security strategist at Synopsys, and Chris Clark, principal security engineer at Synopsys, interview Sammy Migues, principal scientist here at Synopsys, about the new Building Security In Maturity Model (BSIMM) 8 report.

Continue Reading...

Posted in General, Maturity Model (BSIMM) | Comments Off on Fault Injection Podcast: Sammy Migues introduces BSIMM8

 

The BSIMM helps organizations mature software security

How does your software security initiative stack up against the best? Against others in your market? Against your own goals? A Building Security In Maturity Model (BSIMM) assessment can answer these questions.

Continue Reading...

Posted in General, Maturity Model (BSIMM) | Comments Off on The BSIMM helps organizations mature software security

 

Smart devices, smart grids, and cyber security

A recent “Innovation Spotlight” in the IEEE XPLORE Digital Library announced “a first-of-its-kind charger that allows plug-in electric vehicles (PEVs) to deliver excess capacity to the power grid and recharge during off-peak hours.” Promising new technologies often evoke questions about security. Suppose a bad actor exploits the connection somehow and brings down portions of the network or grid?

Continue Reading...

Posted in General, Maturity Model (BSIMM), Security Standards and Compliance | Comments Off on Smart devices, smart grids, and cyber security

 

How to reduce risk while saving on the cost of resolving security defects

Originally posted on SecurityWeek. 

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on How to reduce risk while saving on the cost of resolving security defects

 

How to measure software security in the healthcare industry

In 2015, healthcare became the most attacked industry, replacing financial services. Since 2010, there have been at least eight healthcare industry breaches publically reported in the media. The 2016 Cyber Security Intelligence Index states that five of the eight breaches took place during the first half of 2015. During that period, over 100 million medical records were reportedly compromised. Misalignment between HIPAA and software security The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996. However, the compliance date of HIPAA’s Privacy Rule and Security Rule didn’t take effect until 2003. These rules were created as a way to implement and enforce industry-wide security safeguards on protected health information (PHI).

Continue Reading...

Posted in Healthcare Security, Maturity Model (BSIMM) | Comments Off on How to measure software security in the healthcare industry

 

Webinar: Have you learned the art of building a security strategy?

If you play a role in your organization’s software security program, you already know that there’s no shortage of things to do to improve your firm’s security activities.

Continue Reading...

Posted in General, Maturity Model (BSIMM), Webinars | Comments Off on Webinar: Have you learned the art of building a security strategy?

 

How to mitigate third-party security risks

Third-party products and services are an integral part of business operations. Organizations depend heavily on optimizing their solutions by reducing costs; thus, bringing about the need for external expertise. Third-party organizations promise timely delivery of products and services, meeting compliance requirements, and optimizing the organization’s overall business performance.

Continue Reading...

Posted in General, Maturity Model (BSIMM), Software Architecture and Design | Comments Off on How to mitigate third-party security risks

 

7 undeniable truths to make better software security

Seven years of data gathered from 100+ initiatives provide a bird’s eye view of software security. You can apply lessons from the Building Security In Maturity Model (BSIMM) to your business regardless of your industry, your size, or the mix of your applications. How high can you soar? Learn the seven undeniable truths to make better software security:

Continue Reading...

Posted in General, Maturity Model (BSIMM) | Comments Off on 7 undeniable truths to make better software security

 

How to benchmark your software security strategies

Evaluating the progress of your software security journey is essential, but it can be a considerable challenge. Tracking operational metrics doesn’t tell you whether you are doing the right things. Analyst reports are often too general to provide tactical direction. And companies hold their security plans so close to the vest, it makes competitive research nearly impossible.

Continue Reading...

Posted in Maturity Model (BSIMM), Software Architecture and Design | Comments Off on How to benchmark your software security strategies

 

BSIMM7 explores emerging software security trends and evolution

BSIMM7 was released October 4th, 2016. That’s just a few weeks before the seventh annual BSIMM Community Conference convened on Amelia Island, Florida.

Continue Reading...

Posted in General, Maturity Model (BSIMM) | Comments Off on BSIMM7 explores emerging software security trends and evolution