Looking for ideas to improve how code security is done in your enterprise? Here are several. Code security is something companies have struggled with for some time. In the rush to make new websites and applications available to customers, vulnerabilities are inevitably left behind.But more companies are starting to realize security must be baked into their code from the very beginning. The question is how best to get there.To help answer that question, CSO has assembled a collection of related articles, podcasts and columns in one place for quick study and practical solutions.UPDATED 2/23/2011 Software security for developersIn-depth strategies for writing secure code. 9 key principles and practical advice. Software security basics for application development managersFewer security holes means better software quality and lower costs. Expert guidance on building and managing a software security program that pays off.Code Security: MidAmerican Energy’s top priority after SQL injection attacksSecurity practitioners are increasingly bent on better code security, as Microsoft SDL, BSIMM and Rugged demonstrate. Here’s how it became Priority 1 for one of the nation’s largest energy providers.‘Unbreakable’ was a stretch, ‘Rugged’ more attainableCSO Senior Editor Bill Brenner on why the Rugged Software initiative is a big step forward in the quest for cybersecurity. A New Hope for Software Security?Security firms Fortify and Cigital introduce a new maturity model to help companies make software that’s more secure than you can possibly imagine. But is the Force with them?Inside Oracle’s security assurance programOracle CSO Mary Ann Davidson walks SOURCE Boston attendees through her company’s evolving secure coding effort. Cigital CTO Gary McGraw and CSO Senior Editor Bill Brenner discuss the rollout of BSIMM2 and what it means for the future of secure softwareSource Code Analysis Tools: How to Choose and Use ThemSource code analysis (or static analysis) software helps keeps buggy code from seeing the light of day.How to evaluate and use Web application security scanners”>Specialized application penetration testing tools and services can help keep websites from serving as a front door for hackers and malware, feeding valuable intelligence back to your application development team. Code Writers Finally Get Security? MaybeA new study finds software writers increasingly intent on baking security into their code writing, and Microsoft gets high marks for helping the process along.Microsoft Launches New Security ApproachMicrosoft will soon release tools and methods it has used over the last few years to reduce the number of security problems in its software. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe