Cigital, profile picture

Cigital

Sort by
Secure Design: Threat Modeling
Getting Executive Support for a Software Security Program
Handle With Care: You Have My VA Report!
Can You Really Automate Yourself Secure
How to Choose the Right Security Training for You
6 Most Common Threat Modeling Misconceptions
Video Game Security
Get Your Board to Say "Yes" to a BSIMM Assessment
Software Security Metrics
Software Security Initiative Capabilities: Where Do I Begin?
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Cyber War, Cyber Peace, Stones, and Glass Houses
The Path to Proactive Application Security
BSIMM: Bringing Science to Software Security
BSIMM-V: The Building Security In Maturity Model