This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Path to a Secure Application

From OWASP
Revision as of 12:59, 21 July 2010 by Rahimjina (talk | contribs) (Created page with 'Regardless of the software development process, agile or waterfall, XP, being used, it is critical to understand how to implement security into this to eliminiate security vulner…')

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Regardless of the software development process, agile or waterfall, XP, being used, it is critical to understand how to implement security into this to eliminiate security vulnerabilities before a hacker does. The best place to do this is while the application is being built and not after the application has already been put into production. This presentation will outline the people, process, and technologies that can and should be leveraged to bring security closer to where the problem first gets introduced, in development.