5 steps for application security

The software development lifecycle can be a double-edged sword. On one hand, software needs to be developed with usability in mind, and it needs to be produced quickly. On the other hand, it also needs to maintain a solid security base. Having those two sides in equal measure is easier said than done. Darren Meyer, Senior Security Researcher for Veracode, walks us through five steps for secure application development and deployment.

By Steve Ragan, Staff Writer, CSO, October 18, 2013
Subscribe to slideshows:RSS
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness