Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit www.hp.com/go/fortify

Are developers responsible for the security of their code?

construction408661.jpg

One debate that remains incandescent in the security world is the question of "How much developers should be held accountable for the security of the applications they build?"

Many argue that security should be handled by security professionals, i.e., that infosec types should stop rubbing developers’ noses in their mistakes and instead focus on making security transparent so developers don’t need to think about it.

This is mostly a horrible idea. Continue reading to find out why I think this idea could use a renovation.

Search
About the Author(s)
  • http://www.danielmiessler.com/about
  • I lead the Product Marketing team for Fortify - responsible for global go-to-market strategy for the HP Fortify software security product portfolio. Prior to HP, Maria spent over 15 years in technology product marketing experience, most recently leading the Storage and Availability product marketing team at Symantec. Prior to Symantec she worked at a variety of software and hardware companies focused on the RFID market.
  • US Army veteran. IT and infoSec professional since 1994. Founder of HouSecCon. aka m1a1vet
  • Rick Dunnam is an IS security professional with 15+ years experience in Enterprise Security and has consulted for many industry verticals: Banking, CPG, Healthcare, Government, Hospitality, and more
  • Sam Denard is a Senior Security Engineer with HP Enterprise Security.
Follow Us
Twitter Stream


HP Blog

HP Software Solutions Blog

The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation