Time filter

Source Type

United States

McGraw G.,Cigital
IEEE Security and Privacy | Year: 2016

Gary McGraw talks to Jacob West-chief architect for security products at NetSuite-about secure design, the critical difference between bugs and flaws, and wearable device security. © 2003-2012 IEEE. Source

McGraw G.,Cigital
Computer | Year: 2016

Analyzing data from 78 firms using the Building Security In Maturity Model (BSIMM) revealed four truths about software security that will help firms protect and secure their assets. © 2016 IEEE. Source

McGraw G.,Cigital
IEEE Security and Privacy | Year: 2013

Gary McGraw interviews Thomas Rid, a Reader in War Studies at King's College London. Rid has worked as a visiting scholar in Jerusalem, at the Wilson Center, at RAND, and at the Institut Français de Relation International in Paris. He has PhD in political science from Humboldt University of Berlin; his books include Understanding Counterinsurgency, War 2.0, War and Media Operations. His new book, Cyber War Will Not Take Place, is out in the US with Oxford University Press in September 2013. He lives in London with his wife. Hear the full podcast at www.computer.org/silverbullet. Show links, notes, and an online discussion can be found at www.cigital.com/silverbullet. © 2003-2012 IEEE. Source

Rouse J.,Cigital
Network Security | Year: 2012

Mobile devices enable millions of users to be more productive and interact with their world in more ways than ever before. Today's mobile devices pack quite a punch - multi-core, multi-gigahertz processors, gigabytes of onboard and external storage capabilities coupled with wifi, Bluetooth and GSM or CDMA radios - all packed into a form factor not much larger than a candy bar. Mobile devices are essentially highly miniaturised desktops, and they are also set to become the principle interface between people and business. Chief among the attractions of mobile devices is the use of mobile applications that extend and enhance the capabilities of smartphones in thousands of ways. Mobile devices enable millions of users to be more productive and interact with their world in more ways than ever before. However, mobile applications also expose users and their phones to a multitude of not-so traditional issues, such as a lack of effective security controls, a new information protection landscape, and new security and design paradigms that simply didn't exist a few years ago. Approaches to securing mobile applications build upon many of the techniques used in more traditional software development. However, properly accounting for new threats and attacks requires the use of mobile-specific security assessment processes. Jason Rouse of Cigital explores this threat landscape which, he argues, must be properly understood, especially by those developing software. © 2012 Elsevier Ltd. All rights reserved. Source

McGraw G.,Cigital
IEEE Security and Privacy | Year: 2015

Gary McGraw sits down with security gurus Steven M. Bellovin and Matthew Green, coauthors of the report 'Keys under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications.' © 2003-2012 IEEE. Source

Discover hidden collaborations