Secure Coding: by date

193 messages starting Jan 02 07 and ending Mar 30 07
Date index | Thread index | Author index


Tuesday, 02 January

Compilers Peter Amey
Compilers ljknews
Building Security In vs Auditing McGovern, James F (HTSC, IT)
temporary directories Wietse Venema
Compilers McGovern, James F (HTSC, IT)
Building Security In vs Auditing ljknews
Compilers Peter Amey
Building Security In vs Auditing Gary McGraw
Compilers Leichter, Jerry

Wednesday, 03 January

temporary directories David A. Wheeler
temporary directories Robert C. Seacord
Hiring Security Architects McGovern, James F (HTSC, IT)
Building Security In vs Auditing McGovern, James F (HTSC, IT)
Hiring Security Architects ljknews

Thursday, 04 January

Building Security In vs Auditing Paco Hope
New year's resolutions Goertzel, Karen
Compilers Crispin Cowan
Compilers Florian Weimer
Compilers Leichter, Jerry

Friday, 05 January

Building Security In vs Auditing McGovern, James F (HTSC, IT)

Saturday, 06 January

Building Security In vs Auditing Gunnar Peterson

Sunday, 07 January

QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net

Monday, 08 January

Code Analysis Tool Bakeoff John Steven
QASEC Announcement: Writing Software Security Test Cases J. M. Seitz
Magazines McGovern, James F (HTSC, IT)
QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net

Thursday, 11 January

Secure software education. Does it start with our tools? Dana Epp
Secure software education. Does it start with our tools? ljknews

Saturday, 13 January

Darkreading: Vista meets DRM Gary McGraw

Monday, 15 January

fuzzing the corporate world Gadi Evron

Tuesday, 16 January

Administrivia: Anyone up for a 2nd annual SC-L BoF at S3? Kenneth Van Wyk
Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net

Thursday, 18 January

Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net
Announcement: The Cross-site Request Forgery FAQ Florian Weimer

Friday, 19 January

Source Code Specialist Fortify to Buy Secure Software Kenneth Van Wyk

Monday, 22 January

Adapting Penetration Testing for Software Development Purposes Kenneth Van Wyk
Vulnerability tallies surged in 2006 | The Register Kenneth Van Wyk
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Kenneth Van Wyk
Dark Reading - Discovery and management - Security StartupsMake Debut - Security News Analysis Gary McGraw
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews
Silverbullet: Fortify TAB Gary McGraw
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Chris Wysopal
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Blue Boar
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews
Vulnerability tallies surged in 2006 | The Register Benjamin Tomhave
Vulnerability tallies surged in 2006 | The Register Wall, Kevin

Tuesday, 23 January

Adapting Penetration Testing for Software Development Purposes Chris Wysopal
Vulnerability tallies surged in 2006 | The Register pete werner

Wednesday, 24 January

Vulnerability tallies surged in 2006 | The Register Dinis Cruz
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Crispin Cowan
WEB2.0 Security Issues Avi Shvartz

Thursday, 25 January

Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis der Mouse

Saturday, 27 January

Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews

Sunday, 28 January

WEB2.0 Security Issues Benjamin Tomhave

Tuesday, 30 January

Dr. Dobb's | The Truth About Software Security | January 20, 2007 Kenneth Van Wyk
Dr. Dobb's | The Truth About Software Security | January 20, 2007 ljknews
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Michael S Hines
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Gadi Evron
Dr. Dobb's | The Truth About Software Security | January 20, 2007 der Mouse
Good Magazines and Books KT
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Chris Wysopal
Good Magazines and Books SC-L Subscriber Dave Aronson
Dr. Dobb's | The Truth About Software Security | January 20, 2007 mudge

Wednesday, 31 January

FW: Good Magazines and Books Gary McGraw
FW: Good Magazines and Books Jeremy Epstein
Could mandates on disclosing software effects benefit security? Glenn and Mary Everhart
Could mandates on disclosing software effects benefit bugtraq at cgisecurity.net

Thursday, 01 February

free wine + IEEE S&P at RSA + free wine! KClark-Fisher at computer.org
Could mandates on disclosing software effects benefit Glenn and Mary Everhart

Friday, 02 February

Anotated Bibliography from Software Security (take 2) Gary McGraw
Meeting at RSA next week? KT
Meeting at RSA next week? bugtraq at cgisecurity.net
Meeting at RSA next week? Gary McGraw
Silverbullet: Fortify TAB Brian Chess

Friday, 09 February

OWASP Appsec Europe 2007: deadline for refereed papers extended! Frank Piessens

Monday, 12 February

Show #21 - The One With Cruz Control ... Dinis Cruz
NDSS: Network and Distributed Systems Security Crispin Cowan

Wednesday, 14 February

differences between Threat Analysis and Threat Modeling Jason Grembi
differences between Threat Analysis and Threat Modeling scott hollatz
differences between Threat Analysis and Threat Modeling Benjamin Tomhave

Thursday, 15 February

Silver Bullet 11: Dorothy Denning Gary McGraw

Thursday, 22 February

Anyone here attending the 6th Semi-Annual Software Assurance Forum Kenneth Van Wyk
Anyone here attending the 6th Semi-Annual Software AssuranceForum Goertzel, Karen
differences between Threat Analysis and Threat Modeling Paco Hope

Friday, 23 February

The seven sins of programmers | Free Software Magazine Kenneth Van Wyk
The seven sins of programmers | Free Software Magazine Gunnar Peterson

Saturday, 24 February

New release: "OWASP TESTING GUIDE 2007" Matteo Meucci

Tuesday, 27 February

Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Michael Silk
Dark Reading - Desktop Security - Here Comes the (Web)Fuzz - Security News Analysis Gary McGraw
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz- Security News Analysis J. M. Seitz
Disclosure: vulnerability pimps? or super heroes? Gary McGraw
Disclosure: vulnerability pimps? or super heroes? J. M. Seitz
Disclosure: vulnerability pimps? or super heroes? Michael Silk
Disclosure: vulnerability pimps? or super heroes? Blue Boar

Thursday, 01 March

new blog: Justice League Gary McGraw

Saturday, 03 March

[WEB SECURITY] Wordpress website hacked, wordpress backdoored Dinis Cruz
[WEB SECURITY] Wordpress website hacked, wordpress backdoored bugtraq at cgisecurity.net

Monday, 05 March

Disclosure: vulnerability pimps? or super heroes? Steven M. Christey
Blog posts on Ideas for a Partial Trust Managed Code World Dinis Cruz
Disclosure: vulnerability pimps? or super heroes? Stuart Moore
Disclosure: vulnerability pimps? or super heroes? Gary McGraw

Tuesday, 06 March

Disclosure: vulnerability pimps? or super heroes? Kenneth Van Wyk
Economics of Software Vulnerabilities Ed Reed
Disclosure: vulnerability pimps? or super heroes? Blue Boar
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey

Wednesday, 07 March

IEEE Workshop: Web 2.0 Security & Privacy Larry Koved
Nokia Lets Users Update Phone Software Directly (Phone Scoop) Kenneth Van Wyk

Thursday, 08 March

STSC CrossTalk - Secure Coding Standards - Mar 2007 Kenneth Van Wyk
What defines an InfoSec Professional? McGovern, James F (HTSC, IT)
Information Protection Policies McGovern, James F (HTSC, IT)
What defines an InfoSec Professional? Gunnar Peterson
What defines an InfoSec Professional? Shea, Brian A
Justice League » Blog Archive » Cigital’s Touchpoints versus Microsoft’s SDL [Cigital] Kenneth Van Wyk
What defines an InfoSec Professional? McGovern, James F (HTSC, IT)
What defines an InfoSec Professional? Michael Silk
What defines an InfoSec Professional? Greg Beeley
What defines an InfoSec Professional? Gunnar Peterson
What defines an InfoSec Professional? Steven M. Christey

Friday, 09 March

What defines an InfoSec Professional? Michael S Hines
What defines an InfoSec Professional? SC-L Subscriber Dave Aronson
What defines an InfoSec Professional? Benjamin Tomhave
Information Protection Policies McGovern, James F (HTSC, IT)

Saturday, 10 March

Information Protection Policies Steven M. Christey

Sunday, 11 March

SC-L] What defines an InfoSec Professional? Jason Grembi

Monday, 12 March

Darkreading: compliance Gary McGraw
Darkreading: compliance bugtraq at cgisecurity.net
Darkreading: compliance Michael Silk
Darkreading: compliance Gary McGraw
Darkreading: compliance Steven M. Christey
Economics of Software Vulnerabilities Crispin Cowan
Economics of Software Vulnerabilities Gadi Evron

Tuesday, 13 March

Economics of Software Vulnerabilities Gary McGraw
Economics of Software Vulnerabilities Gary McGraw
Darkreading: compliance Bruce Ediger
Economics of Software Vulnerabilities Gadi Evron
Information Protection Policies Kenneth Van Wyk
Darkreading: compliance Gary McGraw
Information Protection Policies Gary McGraw
Darkreading: compliance Michael Silk

Wednesday, 14 March

Silver Bullet: Becky Bace Gary McGraw

Friday, 16 March

OWASP Spring of Code 2007 Dinis Cruz

Monday, 19 March

How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
How is secure coding sold within enterprises? Andrew van der Stock
Economics of Software Vulnerabilities Crispin Cowan
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities Gary McGraw
Economics of Software Vulnerabilities Ed Reed
Economics of Software Vulnerabilities Crispin Cowan
How is secure coding sold within enterprises? Andrew van der Stock
Economics of Software Vulnerabilities Crispin Cowan
How is secure coding sold within enterprises? John Steven
Economics of Software Vulnerabilities Steven M. Christey

Tuesday, 20 March

Economics of Software Vulnerabilities Michael S Hines
How is secure coding sold within enterprises? John Steven
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
Announcing: 6th OWASP AppSec Conference - May 15-17 2007 - Milan, Italy Dave Wichers
Economics of Software Vulnerabilities ljknews
Economics of Software Vulnerabilities Ed Reed
How is secure coding sold within enterprises? Gunnar Peterson
Question on User Groups McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities Wall, Kevin

Wednesday, 21 March

Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Michael Silk
statical analysis tools: language supports... Indrek Saar
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT)
statical analysis tools: language supports... J. M. Seitz
Economics of Software Vulnerabilities Steven M. Christey
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar
statical analysis tools: language supports... Sebastien Deleersnyder
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) der Mouse
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar
Economics of Software Vulnerabilities Arian J. Evans
Economics of Software Vulnerabilities Steven M. Christey
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar
Economics of Software Vulnerabilities mudge
Economics of Software Vulnerabilities Steven M. Christey

Thursday, 22 March

[fuzzing] MoKB take? J. M. Seitz
Reminder: IEEE Workshop: W2SP 2007: Web 2.0 Security and Privacy 2007 Larry Koved

Friday, 23 March

Economics of Software Vulnerabilities security curmudgeon
Economics of Software Vulnerabilities David A. Wheeler
Economics of Software Vulnerabilities Gunnar Peterson

Monday, 26 March

Full Disclosure: Fuzzled - Perl fuzzing framework Kenneth Van Wyk
Full Disclosure: Fuzzled - Perl fuzzing framework Gadi Evron
[fuzzing] the future of fuzzing [was: Rcov] (fwd) Gadi Evron

Tuesday, 27 March

Economics of Software Vulnerabilities McGovern, James F (HTSC, IT)

Friday, 30 March

SANS Software Security Institute announced Kenneth Van Wyk
Darkreading: compliance Benjamin Tomhave
Darkreading: compliance ljknews