UED: The Unified Execution Diagram
Carlo van Asma & Pascal Wolkotte
Oct 18, 2015
Today’s software applications have a lot of concurrent tasks that are distributed over multiple threads, processes, processors and PCs. This article introduces a visual modeling technique to describe and specify the application’s execution architecture. Within Philips Healthcare the Unified Execution Diagram has proven to be very useful for designing and documenting the execution architecture.
How to Start With Security
Rémon (Ray) Sinnema
Mar 14, 2015
Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.
Developer-Driven Threat Modeling
Nov 11, 2011
Threat modeling is critical for assessing and mitigating the security risks in software systems. In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats using the dataflow diagrams.
Resilient Security Architecture
Sep 27, 2011
In this IEEE article, author John Diamant talks about how to improve security quality of software applications using a proactive approach with techniques like Security requirements gap analysis and Architectural threat analysis in the early phases of software development life cycle.
Real Threat and Real Defenses – Case Study of the Unknown
Sep 03, 2015
Alex Holden examines hackers’ techniques, skills, and shortfalls. He takes a snapshot of the current threat landscape and derives practical lessons by analyzing a number of high profile breaches.
AnyPresence Soups up Enterprise MBaaS Platform- Part 1 of 2 by Martin Monroe Posted on Oct 30, 2013
Department of Homeland Security Weighs in on Threats to Mobile Devices by Martin Monroe Posted on Sep 14, 2013