Q&A with Aaron Turner: Whitelisting is on enterprise blacklist

Securing Productivity Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Tackling Web application security through secure software development

    The threat landscape and increase of Web app attacks has forced security teams to tackle Web app security through secure software development. 

  • Quiz: Choosing a Web security gateway

    Check you're up to speed and ready to choose and deploy a Web security gateway. This five-question quiz will test you on the key points we've covered in the webcast, podcast and article in this Security School. 

  • Security policy for PDF use: How to secure PDF files for the enterprise

    PDF files are an integral part of many enterprises' business processes, and, as such, they are a prime target for malicious activity. In this learning guide, learn how to secure your organization's PDFs, prevent attacks against them and decide when t... 

  • Quiz: Database application security

    How much do you know about database application security? Take this short quiz to determine what you've learned. 

  • Quiz: How to build secure applications

    Use this five-question quiz to test your knowledge of how to secure your enterprise apps. 

  • The Art of Software Security Testing

    Read an excerpt from the book, The Art of Software Security Testing: Identifying Software Security Flaws. In Chapter 11, "Local Fault Injection," the authors explain the proper methods for examining file formats. 

  • How to build secure applications

    In this lesson, learn how to build security into the software development lifecycle, implement a practical, efficient change management system and test your applications using a black-box or white box technique. 

  • Quiz: Could you detect an application attack?

    Take this five-question quiz to test your application security awareness, review common application attacks and learn how to improve application layer logging to detect and protect against these attacks.