SDLC

logdna

Why Logging Matters Throughout the Software Development Life Cycle (SDLC)

There are multiple phases in the software development process that need to be completed before the software can be released into production. Those phases, which are typically iterative, are part of what we call the software development life cycle, or SDLC. During this cycle, developers and software analysts also aim to satisfy nonfunctional requirements like reliability, maintainability, and performance.

WhiteSource

How To Secure Your SDLC The Right Way

The ever-evolving threat landscape in our software development ecosystem demands that we put some thought into the security controls that we use throughout development and delivery in order to keep the bad guys away. This is where the secure software development life cycle (SSDLC) comes into play. Organizations need to make sure that beyond providing their customers with innovative products ahead of the competition, their security is on point every step of the way throughout the SDLC.

Incorporating Security into SDLC with DevSecOps

In public-facing cloud environments with faster than ever deployment and delivery speeds, we need security models that can keep up with the pace. However, security still remains one of the most downplayed affairs in many organizations. While DevOps practices have helped organizations find means to build and react to the market faster, the hurdles of relying on traditional security are still making inroads for more and more threat incidents.
dreamfactory

Optimizing your Software Development Life Cycle (SDLC) with APIs

Executing on your API strategy requires agile, iterative software development life cycles (SDLC) that are both responsive and provide a degree of structure and predictability to the way in which technology is deployed. Mature organizations that have mastered digital transformation have done so by leveraging the power of Application Programming Interfaces (APIs) within SDLC concepts to connect back-end data sources with front-end applications.

smartbear

What Is Document Review?

In the context of the software development lifecycle (SDLC), document review makes it easier for an organization to curate, govern, and manage the lifecycle of digital artifacts beyond source code. These include documentation, spreadsheets, presentations, image flies, system and architectural images, and other files related to software projects. It is a discipline often practiced in regulated industries, or where quality certification is a requirement.

jfrog

SDLC Security: It's Personal for JFrog

The SolarWinds hack, which has affected high-profile Fortune 500 companies and large U.S. federal government agencies, has put the spotlight on software development security — a critical issue for the DevOps community and for JFrog. At a fundamental level, if the code released via CI/CD pipelines is unsafe, all other DevOps benefits are for naught.

logitio

What Is The Software Development Life Cycle (SDLC)?

In our industry, we often like to use the analogy of building a house when we describe how we build software. In our house-building analogy, this would be the blueprint of the house or the process that we are going to follow to construct a home or software. The analogy continues to be relevant because of all the interdependencies that are at work in terms of understanding the blueprint and translating it into work.

veracode

New PCI Regulations Indicate the Need for AppSec Throughout the SDLC

The PCI Security Standards Council (SSC) is a global organization that aims to protect payment transactions and consumer data by developing standards and services for payment software vendors that drive education, awareness, and implementation. Since payment software is constantly changing, the SSC is constantly evolving and adapting its standards to ensure that vulnerabilities and cyberattacks are minimized.

stackify

How to Incorporate Security Into Your company's SDLC

It’s been shown that if you follow a proven collection of practices for developing, designing, testing, implementing, and maintaining your software, you will produce a much higher quality product. Over the past few years, we have seen an increasing number of cases of attacks on the application layer. The Open Web Application Security Project, OWASP, estimates that around one-third of web applications contain security vulnerabilities.