Secure Coding: by date
193 messages
starting Jan 02 07 and
ending Mar 30 07
Date index |
Thread index |
Author index
Tuesday, 02 January
Compilers Peter Amey
Compilers ljknews
Building Security In vs Auditing McGovern, James F (HTSC, IT)
temporary directories Wietse Venema
Compilers McGovern, James F (HTSC, IT)
Building Security In vs Auditing ljknews
Compilers Peter Amey
Building Security In vs Auditing Gary McGraw
Compilers Leichter, Jerry
Wednesday, 03 January
temporary directories David A. Wheeler
temporary directories Robert C. Seacord
Hiring Security Architects McGovern, James F (HTSC, IT)
Building Security In vs Auditing McGovern, James F (HTSC, IT)
Hiring Security Architects ljknews
Thursday, 04 January
Building Security In vs Auditing Paco Hope
New year's resolutions Goertzel, Karen
Compilers Crispin Cowan
Compilers Florian Weimer
Compilers Leichter, Jerry
Friday, 05 January
Building Security In vs Auditing McGovern, James F (HTSC, IT)
Saturday, 06 January
Building Security In vs Auditing Gunnar Peterson
Sunday, 07 January
QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net
Monday, 08 January
Code Analysis Tool Bakeoff John Steven
QASEC Announcement: Writing Software Security Test Cases J. M. Seitz
Magazines McGovern, James F (HTSC, IT)
QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net
Thursday, 11 January
Secure software education. Does it start with our tools? Dana Epp
Secure software education. Does it start with our tools? ljknews
Saturday, 13 January
Darkreading: Vista meets DRM Gary McGraw
Monday, 15 January
fuzzing the corporate world Gadi Evron
Tuesday, 16 January
Administrivia: Anyone up for a 2nd annual SC-L BoF at S3? Kenneth Van Wyk
Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net
Thursday, 18 January
Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net
Announcement: The Cross-site Request Forgery FAQ Florian Weimer
Friday, 19 January
Source Code Specialist Fortify to Buy Secure Software Kenneth Van Wyk
Monday, 22 January
Adapting Penetration Testing for Software Development Purposes Kenneth Van Wyk
Vulnerability tallies surged in 2006 | The Register Kenneth Van Wyk
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Kenneth Van Wyk
Dark Reading - Discovery and management - Security StartupsMake Debut - Security News Analysis Gary McGraw
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews
Silverbullet: Fortify TAB Gary McGraw
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Chris Wysopal
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Blue Boar
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews
Vulnerability tallies surged in 2006 | The Register Benjamin Tomhave
Vulnerability tallies surged in 2006 | The Register Wall, Kevin
Tuesday, 23 January
Adapting Penetration Testing for Software Development Purposes Chris Wysopal
Vulnerability tallies surged in 2006 | The Register pete werner
Wednesday, 24 January
Vulnerability tallies surged in 2006 | The Register Dinis Cruz
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Crispin Cowan
WEB2.0 Security Issues Avi Shvartz
Thursday, 25 January
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis der Mouse
Saturday, 27 January
Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews
Sunday, 28 January
WEB2.0 Security Issues Benjamin Tomhave
Tuesday, 30 January
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Kenneth Van Wyk
Dr. Dobb's | The Truth About Software Security | January 20, 2007 ljknews
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Michael S Hines
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Gadi Evron
Dr. Dobb's | The Truth About Software Security | January 20, 2007 der Mouse
Good Magazines and Books KT
Dr. Dobb's | The Truth About Software Security | January 20, 2007 Chris Wysopal
Good Magazines and Books SC-L Subscriber Dave Aronson
Dr. Dobb's | The Truth About Software Security | January 20, 2007 mudge
Wednesday, 31 January
FW: Good Magazines and Books Gary McGraw
FW: Good Magazines and Books Jeremy Epstein
Could mandates on disclosing software effects benefit security? Glenn and Mary Everhart
Could mandates on disclosing software effects benefit bugtraq at cgisecurity.net
Thursday, 01 February
free wine + IEEE S&P at RSA + free wine! KClark-Fisher at computer.org
Could mandates on disclosing software effects benefit Glenn and Mary Everhart
Friday, 02 February
Anotated Bibliography from Software Security (take 2) Gary McGraw
Meeting at RSA next week? KT
Meeting at RSA next week? bugtraq at cgisecurity.net
Meeting at RSA next week? Gary McGraw
Silverbullet: Fortify TAB Brian Chess
Friday, 09 February
OWASP Appsec Europe 2007: deadline for refereed papers extended! Frank Piessens
Monday, 12 February
Show #21 - The One With Cruz Control ... Dinis Cruz
NDSS: Network and Distributed Systems Security Crispin Cowan
Wednesday, 14 February
differences between Threat Analysis and Threat Modeling Jason Grembi
differences between Threat Analysis and Threat Modeling scott hollatz
differences between Threat Analysis and Threat Modeling Benjamin Tomhave
Thursday, 15 February
Silver Bullet 11: Dorothy Denning Gary McGraw
Thursday, 22 February
Anyone here attending the 6th Semi-Annual Software Assurance Forum Kenneth Van Wyk
Anyone here attending the 6th Semi-Annual Software AssuranceForum Goertzel, Karen
differences between Threat Analysis and Threat Modeling Paco Hope
Friday, 23 February
The seven sins of programmers | Free Software Magazine Kenneth Van Wyk
The seven sins of programmers | Free Software Magazine Gunnar Peterson
Saturday, 24 February
New release: "OWASP TESTING GUIDE 2007" Matteo Meucci
Tuesday, 27 February
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Michael Silk
Dark Reading - Desktop Security - Here Comes the (Web)Fuzz - Security News Analysis Gary McGraw
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk
Dark Reading - Desktop Security - Here Comes the (Web) Fuzz- Security News Analysis J. M. Seitz
Disclosure: vulnerability pimps? or super heroes? Gary McGraw
Disclosure: vulnerability pimps? or super heroes? J. M. Seitz
Disclosure: vulnerability pimps? or super heroes? Michael Silk
Disclosure: vulnerability pimps? or super heroes? Blue Boar
Thursday, 01 March
new blog: Justice League Gary McGraw
Saturday, 03 March
[WEB SECURITY] Wordpress website hacked, wordpress backdoored Dinis Cruz
[WEB SECURITY] Wordpress website hacked, wordpress backdoored bugtraq at cgisecurity.net
Monday, 05 March
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey
Blog posts on Ideas for a Partial Trust Managed Code World Dinis Cruz
Disclosure: vulnerability pimps? or super heroes? Stuart Moore
Disclosure: vulnerability pimps? or super heroes? Gary McGraw
Tuesday, 06 March
Disclosure: vulnerability pimps? or super heroes? Kenneth Van Wyk
Economics of Software Vulnerabilities Ed Reed
Disclosure: vulnerability pimps? or super heroes? Blue Boar
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey
Disclosure: vulnerability pimps? or super heroes? Steven M. Christey
Wednesday, 07 March
IEEE Workshop: Web 2.0 Security & Privacy Larry Koved
Nokia Lets Users Update Phone Software Directly (Phone Scoop) Kenneth Van Wyk
Thursday, 08 March
STSC CrossTalk - Secure Coding Standards - Mar 2007 Kenneth Van Wyk
What defines an InfoSec Professional? McGovern, James F (HTSC, IT)
Information Protection Policies McGovern, James F (HTSC, IT)
What defines an InfoSec Professional? Gunnar Peterson
What defines an InfoSec Professional? Shea, Brian A
Justice League » Blog Archive » Cigital’s Touchpoints versus Microsoft’s SDL [Cigital] Kenneth Van Wyk
What defines an InfoSec Professional? McGovern, James F (HTSC, IT)
What defines an InfoSec Professional? Michael Silk
What defines an InfoSec Professional? Greg Beeley
What defines an InfoSec Professional? Gunnar Peterson
What defines an InfoSec Professional? Steven M. Christey
Friday, 09 March
What defines an InfoSec Professional? Michael S Hines
What defines an InfoSec Professional? SC-L Subscriber Dave Aronson
What defines an InfoSec Professional? Benjamin Tomhave
Information Protection Policies McGovern, James F (HTSC, IT)
Saturday, 10 March
Information Protection Policies Steven M. Christey
Sunday, 11 March
SC-L] What defines an InfoSec Professional? Jason Grembi
Monday, 12 March
Darkreading: compliance Gary McGraw
Darkreading: compliance bugtraq at cgisecurity.net
Darkreading: compliance Michael Silk
Darkreading: compliance Gary McGraw
Darkreading: compliance Steven M. Christey
Economics of Software Vulnerabilities Crispin Cowan
Economics of Software Vulnerabilities Gadi Evron
Tuesday, 13 March
Economics of Software Vulnerabilities Gary McGraw
Economics of Software Vulnerabilities Gary McGraw
Darkreading: compliance Bruce Ediger
Economics of Software Vulnerabilities Gadi Evron
Information Protection Policies Kenneth Van Wyk
Darkreading: compliance Gary McGraw
Information Protection Policies Gary McGraw
Darkreading: compliance Michael Silk
Wednesday, 14 March
Silver Bullet: Becky Bace Gary McGraw
Friday, 16 March
OWASP Spring of Code 2007 Dinis Cruz
Monday, 19 March
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
How is secure coding sold within enterprises? Andrew van der Stock
Economics of Software Vulnerabilities Crispin Cowan
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities Gary McGraw
Economics of Software Vulnerabilities Ed Reed
Economics of Software Vulnerabilities Crispin Cowan
How is secure coding sold within enterprises? Andrew van der Stock
Economics of Software Vulnerabilities Crispin Cowan
How is secure coding sold within enterprises? John Steven
Economics of Software Vulnerabilities Steven M. Christey
Tuesday, 20 March
Economics of Software Vulnerabilities Michael S Hines
How is secure coding sold within enterprises? John Steven
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
How is secure coding sold within enterprises? McGovern, James F (HTSC, IT)
Announcing: 6th OWASP AppSec Conference - May 15-17 2007 - Milan, Italy Dave Wichers
Economics of Software Vulnerabilities ljknews
Economics of Software Vulnerabilities Ed Reed
How is secure coding sold within enterprises? Gunnar Peterson
Question on User Groups McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT)
Economics of Software Vulnerabilities Wall, Kevin
Wednesday, 21 March
Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Michael Silk
statical analysis tools: language supports... Indrek Saar
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT)
statical analysis tools: language supports... J. M. Seitz
Economics of Software Vulnerabilities Steven M. Christey
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar
statical analysis tools: language supports... Sebastien Deleersnyder
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) der Mouse
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar
Economics of Software Vulnerabilities Arian J. Evans
Economics of Software Vulnerabilities Steven M. Christey
[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar
Economics of Software Vulnerabilities mudge
Economics of Software Vulnerabilities Steven M. Christey
Thursday, 22 March
[fuzzing] MoKB take? J. M. Seitz
Reminder: IEEE Workshop: W2SP 2007: Web 2.0 Security and Privacy 2007 Larry Koved
Friday, 23 March
Economics of Software Vulnerabilities security curmudgeon
Economics of Software Vulnerabilities David A. Wheeler
Economics of Software Vulnerabilities Gunnar Peterson
Monday, 26 March
Full Disclosure: Fuzzled - Perl fuzzing framework Kenneth Van Wyk
Full Disclosure: Fuzzled - Perl fuzzing framework Gadi Evron
[fuzzing] the future of fuzzing [was: Rcov] (fwd) Gadi Evron
Tuesday, 27 March
Economics of Software Vulnerabilities McGovern, James F (HTSC, IT)
Friday, 30 March
SANS Software Security Institute announced Kenneth Van Wyk
Darkreading: compliance Benjamin Tomhave
Darkreading: compliance ljknews