Companies are implementing software security initiatives, but are they doing it the right way? What is the right way, anyway, This short articles lays down ten commandments that offer prescriptive guidance for a software security initiative based on BSIMM (Building Security in Maturity Model) data gathered from security initiatives at corporations all over the world. Read all the “thou shalts” and “thou shalt nots” here:
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.