Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Developers and Security Teams Under Pressure to Collaborate
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2019 | 6:27:19 PM
10 years ago
Looking back 10- to 15 years, there has been a clear way security and development worked: engineers built code and handed it over to security when it was ready. By the time security came back with fixes, developers would be in a time crunch; rarely was there time to address them all. This is true. We were not paying that much attention to security at the beginning on the past.
tdsan
50%
50%
tdsan,
User Rank: Ninja
6/27/2019 | 3:18:50 PM
SecDev - wave of the future
Overall, it also helps when developers have a security background, as it improves understanding between the two teams and, consequently, their working relationship. It's often not required for developers to have a security background, but it is a plus if they're interested in the space. Veracoda does quarterly boot camps and exercises to train developers in cybersecurity.

This section identified in your article is the best thing any company could do. I loved the article and it brought insignt into some of the shortcomings in the private and public sector development shops. We will be incorporating "SecDev" or "Security Development" teams into our environment as well and thank you for this valuable insight.

Excellent.

Todd
<<   <   Page 2 / 2


Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3500
PUBLISHED: 2021-06-24
A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file may lead to application crash and other consequences.
CVE-2020-18670
PUBLISHED: 2021-06-24
Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
CVE-2020-18671
PUBLISHED: 2021-06-24
Cross Site Scripting (XSS) vulnerability in Roundcube Mail &lt;=1.4.4 via smtp config in /installer/test.php.
CVE-2020-4885
PUBLISHED: 2021-06-24
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow a local user to access and change the configuration of Db2 due to a race condition of a symbolic link,. IBM X-Force ID: 190909.
CVE-2020-4945
PUBLISHED: 2021-06-24
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user to overwrite arbirary files due to improper group permissions. IBM X-Force ID: 191945.