Secure Coding: by author
193 messages
starting Mar 19 07 and
ending Jan 02 07
Date index |
Thread index |
Author index
Andrew van der Stock
How is secure coding sold within enterprises? Andrew van der Stock (Mar 19)
How is secure coding sold within enterprises? Andrew van der Stock (Mar 19)
Arian J. Evans
Economics of Software Vulnerabilities Arian J. Evans (Mar 21)
Avi Shvartz
WEB2.0 Security Issues Avi Shvartz (Jan 24)
Benjamin Tomhave
WEB2.0 Security Issues Benjamin Tomhave (Jan 28)
Darkreading: compliance Benjamin Tomhave (Mar 30)
differences between Threat Analysis and Threat Modeling Benjamin Tomhave (Feb 14)
What defines an InfoSec Professional? Benjamin Tomhave (Mar 09)
Vulnerability tallies surged in 2006 | The Register Benjamin Tomhave (Jan 22)
Blue Boar
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Blue Boar (Jan 22)
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
Disclosure: vulnerability pimps? or super heroes? Blue Boar (Mar 06)
Disclosure: vulnerability pimps? or super heroes? Blue Boar (Feb 27)
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
Brian Chess
Silverbullet: Fortify TAB Brian Chess (Feb 02)
Bruce Ediger
Darkreading: compliance Bruce Ediger (Mar 13)
bugtraq at cgisecurity.net
[WEB SECURITY] Wordpress website hacked, wordpress backdoored bugtraq at cgisecurity.net (Mar 03)
Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net (Jan 16)
QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net (Jan 07)
QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net (Jan 08)
Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net (Jan 18)
Could mandates on disclosing software effects benefit bugtraq at cgisecurity.net (Jan 31)
Meeting at RSA next week? bugtraq at cgisecurity.net (Feb 02)
Darkreading: compliance bugtraq at cgisecurity.net (Mar 12)
Chris Wysopal
Adapting Penetration Testing for Software Development Purposes Chris Wysopal (Jan 23)
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Chris Wysopal (Jan 30)
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Chris Wysopal (Jan 22)
Crispin Cowan
Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
Economics of Software Vulnerabilities Crispin Cowan (Mar 12)
Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
Compilers Crispin Cowan (Jan 04)
NDSS: Network and Distributed Systems Security Crispin Cowan (Feb 12)
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Crispin Cowan (Jan 24)
Dana Epp
Secure software education. Does it start with our tools? Dana Epp (Jan 11)
Dave Wichers
Announcing: 6th OWASP AppSec Conference - May 15-17 2007 - Milan, Italy Dave Wichers (Mar 20)
David A. Wheeler
Economics of Software Vulnerabilities David A. Wheeler (Mar 23)
temporary directories David A. Wheeler (Jan 03)
der Mouse
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) der Mouse (Mar 21)
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis der Mouse (Jan 25)
Dr. Dobb's | The Truth About Software Security | January 20, 2007 der Mouse (Jan 30)
Dinis Cruz
Blog posts on Ideas for a Partial Trust Managed Code World Dinis Cruz (Mar 05)
[WEB SECURITY] Wordpress website hacked, wordpress backdoored Dinis Cruz (Mar 03)
Show #21 - The One With Cruz Control ... Dinis Cruz (Feb 12)
Vulnerability tallies surged in 2006 | The Register Dinis Cruz (Jan 24)
OWASP Spring of Code 2007 Dinis Cruz (Mar 16)
Ed Reed
Economics of Software Vulnerabilities Ed Reed (Mar 19)
Economics of Software Vulnerabilities Ed Reed (Mar 20)
Economics of Software Vulnerabilities Ed Reed (Mar 06)
Florian Weimer
Compilers Florian Weimer (Jan 04)
Announcement: The Cross-site Request Forgery FAQ Florian Weimer (Jan 18)
Frank Piessens
OWASP Appsec Europe 2007: deadline for refereed papers extended! Frank Piessens (Feb 09)
Gadi Evron
fuzzing the corporate world Gadi Evron (Jan 15)
Full Disclosure: Fuzzled - Perl fuzzing framework Gadi Evron (Mar 26)
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Gadi Evron (Jan 30)
[fuzzing] the future of fuzzing [was: Rcov] (fwd) Gadi Evron (Mar 26)
Economics of Software Vulnerabilities Gadi Evron (Mar 12)
Economics of Software Vulnerabilities Gadi Evron (Mar 13)
Gary McGraw
Darkreading: Vista meets DRM Gary McGraw (Jan 13)
Darkreading: compliance Gary McGraw (Mar 12)
Economics of Software Vulnerabilities Gary McGraw (Mar 19)
Disclosure: vulnerability pimps? or super heroes? Gary McGraw (Feb 27)
Meeting at RSA next week? Gary McGraw (Feb 02)
Darkreading: compliance Gary McGraw (Mar 13)
Information Protection Policies Gary McGraw (Mar 13)
Anotated Bibliography from Software Security (take 2) Gary McGraw (Feb 02)
Building Security In vs Auditing Gary McGraw (Jan 02)
Economics of Software Vulnerabilities Gary McGraw (Mar 13)
Silver Bullet 11: Dorothy Denning Gary McGraw (Feb 15)
FW: Good Magazines and Books Gary McGraw (Jan 31)
Silver Bullet: Becky Bace Gary McGraw (Mar 14)
Silverbullet: Fortify TAB Gary McGraw (Jan 22)
new blog: Justice League Gary McGraw (Mar 01)
Darkreading: compliance Gary McGraw (Mar 12)
Dark Reading - Desktop Security - Here Comes the (Web)Fuzz - Security News Analysis Gary McGraw (Feb 27)
Dark Reading - Discovery and management - Security StartupsMake Debut - Security News Analysis Gary McGraw (Jan 22)
Disclosure: vulnerability pimps? or super heroes? Gary McGraw (Mar 05)
Economics of Software Vulnerabilities Gary McGraw (Mar 13)
Glenn and Mary Everhart
Could mandates on disclosing software effects benefit security? Glenn and Mary Everhart (Jan 31)
Could mandates on disclosing software effects benefit Glenn and Mary Everhart (Feb 01)
Goertzel, Karen
Anyone here attending the 6th Semi-Annual Software AssuranceForum Goertzel, Karen (Feb 22)
New year's resolutions Goertzel, Karen (Jan 04)
Greg Beeley
What defines an InfoSec Professional? Greg Beeley (Mar 08)
Gunnar Peterson
What defines an InfoSec Professional? Gunnar Peterson (Mar 08)
Building Security In vs Auditing Gunnar Peterson (Jan 06)
What defines an InfoSec Professional? Gunnar Peterson (Mar 08)
How is secure coding sold within enterprises? Gunnar Peterson (Mar 20)
The seven sins of programmers | Free Software Magazine Gunnar Peterson (Feb 23)
Economics of Software Vulnerabilities Gunnar Peterson (Mar 23)
Indrek Saar
statical analysis tools: language supports... Indrek Saar (Mar 21)
Jason Grembi
differences between Threat Analysis and Threat Modeling Jason Grembi (Feb 14)
SC-L] What defines an InfoSec Professional? Jason Grembi (Mar 11)
Jeremy Epstein
FW: Good Magazines and Books Jeremy Epstein (Jan 31)
J. M. Seitz
Disclosure: vulnerability pimps? or super heroes? J. M. Seitz (Feb 27)
QASEC Announcement: Writing Software Security Test Cases J. M. Seitz (Jan 08)
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz- Security News Analysis J. M. Seitz (Feb 27)
[fuzzing] MoKB take? J. M. Seitz (Mar 22)
statical analysis tools: language supports... J. M. Seitz (Mar 21)
John Steven
Code Analysis Tool Bakeoff John Steven (Jan 08)
How is secure coding sold within enterprises? John Steven (Mar 20)
How is secure coding sold within enterprises? John Steven (Mar 19)
KClark-Fisher at computer.org
free wine + IEEE S&P at RSA + free wine! KClark-Fisher at computer.org (Feb 01)
Kenneth Van Wyk
Vulnerability tallies surged in 2006 | The Register Kenneth Van Wyk (Jan 22)
Information Protection Policies Kenneth Van Wyk (Mar 13)
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk (Feb 27)
Nokia Lets Users Update Phone Software Directly (Phone Scoop) Kenneth Van Wyk (Mar 07)
Full Disclosure: Fuzzled - Perl fuzzing framework Kenneth Van Wyk (Mar 26)
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk (Feb 27)
The seven sins of programmers | Free Software Magazine Kenneth Van Wyk (Feb 23)
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk (Feb 27)
Justice League » Blog Archive » Cigital’s Touchpoints versus Microsoft’s SDL [Cigital] Kenneth Van Wyk (Mar 08)
Administrivia: Anyone up for a 2nd annual SC-L BoF at S3? Kenneth Van Wyk (Jan 16)
Anyone here attending the 6th Semi-Annual Software Assurance Forum Kenneth Van Wyk (Feb 22)
Source Code Specialist Fortify to Buy Secure Software Kenneth Van Wyk (Jan 19)
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Kenneth Van Wyk (Jan 22)
Adapting Penetration Testing for Software Development Purposes Kenneth Van Wyk (Jan 22)
SANS Software Security Institute announced Kenneth Van Wyk (Mar 30)
Disclosure: vulnerability pimps? or super heroes? Kenneth Van Wyk (Mar 06)
STSC CrossTalk - Secure Coding Standards - Mar 2007 Kenneth Van Wyk (Mar 08)
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Kenneth Van Wyk (Jan 30)
KT
Meeting at RSA next week? KT (Feb 02)
Good Magazines and Books KT (Jan 30)
Larry Koved
Reminder: IEEE Workshop: W2SP 2007: Web 2.0 Security and Privacy 2007 Larry Koved (Mar 22)
IEEE Workshop: Web 2.0 Security & Privacy Larry Koved (Mar 07)
Leichter, Jerry
Compilers Leichter, Jerry (Jan 04)
Compilers Leichter, Jerry (Jan 02)
ljknews
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews (Jan 27)
Hiring Security Architects ljknews (Jan 03)
Compilers ljknews (Jan 02)
Building Security In vs Auditing ljknews (Jan 02)
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews (Jan 22)
Economics of Software Vulnerabilities ljknews (Mar 20)
Dr. Dobb's | The Truth About Software Security | January 20, 2007 ljknews (Jan 30)
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews (Jan 22)
Secure software education. Does it start with our tools? ljknews (Jan 11)
Darkreading: compliance ljknews (Mar 30)
Matteo Meucci
New release: "OWASP TESTING GUIDE 2007" Matteo Meucci (Feb 24)
McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT) (Mar 20)
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 19)
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 20)
Information Protection Policies McGovern, James F (HTSC, IT) (Mar 08)
What defines an InfoSec Professional? McGovern, James F (HTSC, IT) (Mar 08)
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT) (Mar 27)
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT) (Mar 21)
Information Protection Policies McGovern, James F (HTSC, IT) (Mar 09)
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 20)
Compilers McGovern, James F (HTSC, IT) (Jan 02)
Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 03)
What defines an InfoSec Professional? McGovern, James F (HTSC, IT) (Mar 08)
Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 02)
Question on User Groups McGovern, James F (HTSC, IT) (Mar 20)
Hiring Security Architects McGovern, James F (HTSC, IT) (Jan 03)
Magazines McGovern, James F (HTSC, IT) (Jan 08)
Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 05)
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 19)
Michael S Hines
Economics of Software Vulnerabilities Michael S Hines (Mar 20)
What defines an InfoSec Professional? Michael S Hines (Mar 09)
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Michael S Hines (Jan 30)
Michael Silk
Disclosure: vulnerability pimps? or super heroes? Michael Silk (Feb 27)
Darkreading: compliance Michael Silk (Mar 13)
Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Michael Silk (Mar 21)
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Michael Silk (Feb 27)
Darkreading: compliance Michael Silk (Mar 12)
What defines an InfoSec Professional? Michael Silk (Mar 08)
mudge
Dr. Dobb's | The Truth About Software Security | January 20, 2007 mudge (Jan 30)
Economics of Software Vulnerabilities mudge (Mar 21)
Paco Hope
Building Security In vs Auditing Paco Hope (Jan 04)
differences between Threat Analysis and Threat Modeling Paco Hope (Feb 22)
Peter Amey
Compilers Peter Amey (Jan 02)
Compilers Peter Amey (Jan 02)
pete werner
Vulnerability tallies surged in 2006 | The Register pete werner (Jan 23)
Robert C. Seacord
temporary directories Robert C. Seacord (Jan 03)
SC-L Subscriber Dave Aronson
Good Magazines and Books SC-L Subscriber Dave Aronson (Jan 30)
What defines an InfoSec Professional? SC-L Subscriber Dave Aronson (Mar 09)
scott hollatz
differences between Threat Analysis and Threat Modeling scott hollatz (Feb 14)
Sebastien Deleersnyder
statical analysis tools: language supports... Sebastien Deleersnyder (Mar 21)
security curmudgeon
Economics of Software Vulnerabilities security curmudgeon (Mar 23)
Shea, Brian A
What defines an InfoSec Professional? Shea, Brian A (Mar 08)
Steven M. Christey
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey (Mar 06)
Economics of Software Vulnerabilities Steven M. Christey (Mar 21)
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey (Mar 05)
What defines an InfoSec Professional? Steven M. Christey (Mar 08)
Economics of Software Vulnerabilities Steven M. Christey (Mar 21)
Economics of Software Vulnerabilities Steven M. Christey (Mar 19)
Information Protection Policies Steven M. Christey (Mar 10)
Darkreading: compliance Steven M. Christey (Mar 12)
Economics of Software Vulnerabilities Steven M. Christey (Mar 21)
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey (Mar 06)
Stuart Moore
Disclosure: vulnerability pimps? or super heroes? Stuart Moore (Mar 05)
Wall, Kevin
Economics of Software Vulnerabilities Wall, Kevin (Mar 20)
Vulnerability tallies surged in 2006 | The Register Wall, Kevin (Jan 22)
Wietse Venema
temporary directories Wietse Venema (Jan 02)