Thanks for the response. One of the things that I have been struggling to
understand is not the importance of using such a tool as I believe they provide
value but more of the fact that these tools may not be financial sustainable.
Many large enterprises nowadays outsource development to third p
On Mon, 5 Jun 2006, David A. Wheeler wrote:
| ... One reason is that people can get degrees in
| Computer Security or Software Engineering without knowing how to
| develop software that receives hostile data. Even the
| "Software Engineering Body of Knowledge" essentially
| omits security issues (
Title: Samsung "gets it"!
Anyone looking to move to Austin, TX?
--
Karen Mercedes Goertzel, CISSP
Booz Allen Hamilton
703-902-6981
[EMAIL PROTECTED]
-Original Message-
[snip]
>1. US: Austin, Texas: Senior Security Systems Analyst
> Posted by: "Andrew Cardwell" [EMAIL PROTECTED
| Date: Mon, 5 Jun 2006 16:50:17 -0400
| From: "McGovern, James F (HTSC, IT)" <[EMAIL PROTECTED]>
| To: sc-l@securecoding.org
| Subject: [SC-L] Comparing Scanning Tools
|
| The industry analyst take on tools tends to be slightly different than
| software practitioners at times. Curious if anyone h
Article which may be of interest to the J2EE crowd:
http://www.growingbusinesssolutions.com/Reusable-Security-for-
Segmented-Data-Domains.pdf
"According to John C. Dale, MS MIS, president of Growing Business
Solutions, for firms providing software development outsourcing
services, the prac