Cybersecurity, Industry

The BSA Framework for Secure Software: Two Years Later

Two years ago, BSA | The Software Alliance launched a first-of-its-kind tool to describe, evaluate, and encourage security throughout the software lifecycle. Read More >>

Two years ago, BSA | The Software Alliance launched a first-of-its-kind tool to describe, evaluate, and encourage security throughout the software lifecycle. Read More >>

Cybersecurity, Industry

New Software Development Guidelines Combat Growing Risks

When BSA released its Framework for Secure Software last year, we promised the Framework would be a living document, updated to incorporate the most current guidance on combatting threats to the software ecosystem. Today, we are making good on that promise with an update to the Framework that brings new focus to mitigating rapidly growing … Read More >>

Cybersecurity, Industry

A New Framework for Software Security

Today, BSA | The Software Alliance launched the BSA Framework for Secure Software. This first-of-its-kind tool will enable the software industry, its customers, and policymakers to describe, assess, and encourage security throughout the software lifecycle in a specific, meaningful way. Software-based cyber threats are on the rise – the Ponemon Institute reported that 77% of … Read More >>

Industry

BSA Celebrates 30 Years and Honors 2018 Software Champions

Last night, we celebrated BSA’s 30th Anniversary by honoring Sens. Todd Young and Maria Cantwell and Reps. Doug Collins and Hakeem Jeffries as BSA’s 2018 Software Champions during a reception at the US Capitol. Each of these members has worked diligently for issues that matter to the software industry, including driving a constructive discussion about … Read More >>

Cybersecurity, Data, Global Markets, Industry

Tech and Law Enforcement Should Deepen Cooperation to Fight Crime

Debate about law enforcement’s ability to access encrypted devices and communications remains a stalemate. Law enforcement leaders continue to insist on the need for extraordinary access to encryption in criminal investigations; technology experts note that such an approach would bring untenable risks to the security and privacy of individuals, businesses, and critical infrastructure. While this … Read More >>