A US task force of security experts, academics and business and government officials has released recommendations aimed at making software more secure.
The report by the task force of the National Cyber Security Partnership said that security should be a core component of software development programmes at university level, and advocated a Software Security Certification Accreditation Programme.
It maintained that best practices need to be developed for putting security at the heart of the software design process.
The recommendations include adopting a set of 'Guiding Principles for Patch Management' to ensure that patches are well tested, small, localised, reversible and easy to install.
Developers and companies should adopt an 'Incentives Framework' to produce effective strategies and incentives for making software more secure.
Task force co-chairman Scott Charney, chief security strategist at Microsoft, said in a statement: "Software security is a serious, long-term, multifaceted problem that requires multiple solutions and the application of resources through the development lifecycle, but there is no silver bullet for making software secure."
Ron Moritz, task force co-chairman, and chief security strategist at Computer Associates, added: "By helping to improve research, education, software development and the processes by which patches are distributed and managed, these initiatives will further augment the economic value and social benefits that software delivers while making the global digital environment significantly more secure."
A smartphone maker fiddling its benchmarking scores? That's unusual, isn't it?
'We are making good progress on 10nm,' claims Intel
Engineer calculates that Chengdu's plan to replace streetlights with artificial moonlight would cost $100bn
Research could also apply to other 'space weather' events involving hot, fast-moving plasma