Secure Coding

Best practices for secure coding in your organization.

  • 7 Tips to Building a Security Culture Within an Organization

    7 Tips to Building a Security Culture Within an Organization

    Learn about the best practices for building and infusing a security culture within an organization.

    Read Article
  • A Guide to Application Security

    A Guide to Application Security

    Learn more about application security.

    Read Flipbook
  • Engineering Privacy into Software

    Engineering Privacy into Software

    Learn about the importance of engineering privacy into software.

    Read Article
  • Best Practices to Code Securely

    Best Practices to Code Securely

    Tips to help you stay on top of secure coding requirements.

    Read Article
  • Major Financial Institution Makes SD Elements Part of Standard Development Process to 7000 Applications

    Major Financial Institution Makes SD Elements Part of Standard Development Process to 7000 Applications

    Read Article
  • A Large Technology Client Uses SD Elements to Manage Compliance with Internal Secure Coding Standards for Nearly 80% of Applications

    A Large Technology Client Uses SD Elements to Manage Compliance with Internal Secure Coding Standards for Nearly 80% of Applications

    Read Article
  • SD Elements in the Modern Enterprise

    SD Elements in the Modern Enterprise

    Our expert platform, SD Elements, fills a handful of security gaps in the modern enterprise. Learn about its use cases here.

    Read Flipbook
  • Choosing the Right Security Requirements Solution for your Organization

    Choosing the Right Security Requirements Solution for your Organization

    Imagine turning on the radio and discovering that there is only one radio station playing one artist who has the only musical instrument in the world. Now imagine that radio is the only way to...

    Read Article
  • GDP 101  GDPR for Developers

    GDP 101 GDPR for Developers

    Learn about our course, GDPR for Developers.

    Read Flipbook
  • A World with Security-Minded Developers: What Will It Take?

    A World with Security-Minded Developers: What Will It Take?

    Pranoy De, Solutions Engineer at Security Compass, tells us what it's like to take on security as an engineer.

    Read Article
  • SD Elements Minimizes Security Risks in Software Built by 3rd Party Developers

    SD Elements Minimizes Security Risks in Software Built by 3rd Party Developers

    SD Elements can be used to reduce security risk in software developed by 3rd parties in your organization.

    Read Article
  • Find and Fix Your Application Security Pain Points

    Find and Fix Your Application Security Pain Points

    It can be tough creating and implementing a secure application development process. There are so many project-specific vulnerabilities and requirements that it’s hard to make sure you’re covering...

    Read Article
  • 6 Steps to Getting Started with Software Security Requirements

    6 Steps to Getting Started with Software Security Requirements

    Learn how to manage software security requirements in your organization.

    Read Flipbook
  • Three Ways to Manage Security in Agile/DevOps

    Three Ways to Manage Security in Agile/DevOps

    DevOps, the word, is a combination of “development” and “operations”. It represents more than just a team or a process or an idea. DevOps is actually an organizational culture or practice aimed at...

    Read Article
  • Easing Security into Unique Development Environments

    Easing Security into Unique Development Environments

    Richard Sanchez is a patient at the Eye Associates of Pinellas. Mr. Sanchez was told earlier in June that his personal and health information may have been stolen when Bizmatics, a software vendor...

    Read Article
  • Top 5 Benefits of Role-based Security Training for Developers

    Top 5 Benefits of Role-based Security Training for Developers

    Software fulfills many critical roles in business today — from generating revenue to increasing operational efficiency. Software engineering teams face growing development queues and pressure to...

    Read Article
  • Vishal Asthana quoted in Techbeacon article 'OWASP Top 10: What's missing for enterprise app sec'

    Vishal Asthana quoted in Techbeacon article 'OWASP Top 10: What's missing for enterprise app sec'

    Learn about what security expert, Vishal Asthana thinks is missing in enterprise app sec.

    Read Article
  • 3 Reasons Why a One-size Fits all Secure SDLC Solution Won’t Work

    3 Reasons Why a One-size Fits all Secure SDLC Solution Won’t Work

    3 Reasons Why a One-size Fits all Secure SDLC Solution Won’t Work When we ask security contacts at our enterprise clients “What software development methodology does your company use?”, they...

    Read Article
  • Open Web Application Security Project Top 10

    Open Web Application Security Project Top 10

    The OWASP Top 10 focuses on security concerns for web applications. Read on to learn more about these mainstream security concerns.

    Read Article
  • How to Automatically Verify Security Requirements: SD Elements & Fortify Integration

    How to Automatically Verify Security Requirements: SD Elements & Fortify Integration

    We’re excited about our integration with Fortify. It follows on our recent Veracode integration. With these integrations a company can automatically create a set of tailored security requirements...

    Read Article
  • loading
    Loading More...