Software development organizations are constantly pressured to meet security standards [1]. Seeking to attend to this market demand, the…
Why perform vulnerability prioritization? While developing an application, it is common to notice the inefficiency of some teams when they…
The defect management practice consists of collecting, recording, and analyzing security defects, in addition, of course, to enrich this…
Security is a relevant attribute for quality within a software architecture context. Therefore, it should be a priority. But what are the…
Continuing the series of publications about the OWASP SAMM (Software Assurance Maturity Model) framework, we will now approach the security…
In this article we will continue the series of publications on the OWASP SAMM (Software Assurance Maturity Model), we will address the…
In this article, we will approach threat modeling according to the Software Security Maturity Model, also known by the acronym SAMM. It is…
“The security architecture practice focuses on managing architectural risks for the software solution.” Before we talk about…
Within development teams, managing results in CI/CD tools, getting visibility, continuous feedback, quick iterations, and being able to find…