alphaspirit - Fotolia
In this screencast video, Keith Barker of CBT Nuggets offers a tutorial on how to perform a thorough Web application security scan using w3af.
A new website built by Troy Hunt enables possible data breach victims to discover compromised accounts from several high-profile breaches.
Reusing open source code can present a security risk. Application security expert Michael Cobb explains why and how to protect applications.
Expert Michael Cobb explains why enterprises need better open source code management to negate the security risks posed by open source libraries.