Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP Global AppSec Barcelona 2025
    • Codific @ OWASP
    • Careers
  • Partners
    • Implementation Partners Program
    • Recommended Vendors Program
      • Our Recommended Vendors
    • Academic Application Security Program
  • Customers
  • Insights
  • Contact
  • Go to SAMMY

Secure Software Development

Home Secure Software Development
Steps to implement OWASP SAMM graphic

04

Apr

How to implement OWASP SAMM: Tooling, Example and Mistakes to Avoid

  • Nicolas Montauban
  • Application Security, OWASP SAMM, Secure Software Development, Software security, Team Management

Understanding OWASP SAMM is only the beginning. The real value comes from using it to […]

Read Article
Application risk shown by a safe vault with cracks

25

Feb

Master OWASP SAMM Application Risk Profiles with Heeler

  • Aram Hovsepyan
  • Application Security, SAMM, Secure Software Development
Introduction: Application Risk Profile with Heeler A clear understanding of risk is the foundation of[...]
Read Article
Visual representation of an application security architecture with snow on top

12

Feb

Master OWASP SAMM Architecture Validation with IcePanel

  • Aram Hovsepyan
  • Application Security, SAMM, Secure Software Development
Introduction: Architecture Validation with IcePanel Architecture validation is the process of reviewing your architecture to[...]
Read Article
Security frameworks ontology

12

Dec

Information Security and Cybersecurity: Understanding the Layers

  • Aram Hovsepyan
  • Application Security, Cybersecurity, Information Security, Secure Software Development

The terms information security and cybersecurity are often used interchangeably, which frequently leads to confusion.[…]

Read Article
CSF 2.0 Functions

20

Nov

What is NIST CSF 2.0 and how to implement it

  • Aram Hovsepyan
  • Application Security, Cybersecurity, Secure Software Development

Managing cybersecurity risks requires a clear strategy combining people, processes, tools, and knowledge, all guided[…]

Read Article
Mastering OWASP SAMM

02

Nov

Common mistakes when implementing OWASP SAMM

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

OWASP Software Assurance Maturity Model (SAMM) is one of the only comprehensive frameworks available for[…]

Read Article
Mastering OWASP SAMM

20

Oct

Supplier Security Explained: Best Practices to Manage Supplier Risk

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

What is supplier risk management about? Outsourcing software development has become a cornerstone for many[…]

Read Article
Mastering OWASP SAMM

19

Oct

Software Security Requirements Explained: Why It Matters and How to Implement It Effectively

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

Introduction to software security requirements Despite clearly understanding the importance of security requirements, organizations seem[…]

Read Article
Bridging cybersecurity compliance standards

02

Oct

Mapping compliance standards: Harnessing SAMMY and OpenCRE

  • Aram Hovsepyan
  • Application Security, NIST SSDF, OWASP, SAMM, Secure Software Development, Software security

Cybersecurity in general and application security (AppSec) in particular are extremely challenging topics. They run[…]

Read Article
Security requirements driven testing

28

Feb

Security Requirements Driven Development: the best ROI for your SDLC

  • Aram Hovsepyan
  • Application Security, SAMM, SDLC, Secure Software Development, Software security, SSDLC

Application security requires a systematic approach and requires dealing with software security throughout every stage[…]

Read Article
OWASP ZAP and Github

29

Dec

How to integrate OWASP ZAP in Gitlab CI/CD pipeline.

  • Viki Grozdeva
  • SAMM, Secure Software Development, Security, Software security
In this article you will learn how to automate your secure deployment by integrating OWASP[...]
Read Article
Secure Software Development with SAMM: Misuse/Abuse testing

05

Sep

Security verification with Jmeter Stress Test

  • Alex Ashkov
  • Secure Software Development, Security Software Engineer, Software security

Security verification is about validating that a system or application adheres to predefined security requirements[…]

Read Article
Next

Building a simple and safe digital future

  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP Privacy by Design SAMM Secure Software Development Security Security Software Engineer Software security SSDLC

Recent Post

  • Conceptual illustration of the SSDLC

    June 11, 2025

    What Is the SSDLC? A Guide to Secure Development

    June 11, 2025

  • dependency governance in SOOS

    June 03, 2025

    Master Dependency Management with SOOS and SAMM

    June 03, 2025

  • vulnerability management dashboard

    May 26, 2025

    Security metrics with purpose and strategic impact

    May 26, 2025

In the Spotlight

  • SAMMY
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}