Email Alerts
-
Gary McGraw: Build security in from start
If the field of computer security is to be fixed, the only hope we have is building security in, says software security expert Gary McGraw. News | 09 Apr 2012
-
Nothing funny about SCADA and ICS security
A researcher calls the state of industrial control system security “laughable” and warns of the consequences of unpatched critical infrastructure that is reachable over the Internet. News | 06 Feb 2012
-
Microsoft emergency update to address hash collision attacks
A critical update affects all versions of Microsoft .NET Framework and other programming languages. The vulnerability could allow denial-of-service attacks. News | 29 Dec 2011
-
Cybersecurity career experts: Mobile app security skills hot in 2012
The increase in smartphones and other mobile devices has fueled demand for IT security pros with mobile app security and networking skills, say several cybersecurity career experts. News | 28 Dec 2011
-
Android app security: Study finds mobile developers creating flawed Android apps
A study of enterprise applications designed for Android devices found over 40% of Android applications contain hard-coded cryptographic keys, a practice that weakens Android app security. News | 08 Dec 2011
-
Adobe Flex update patches flaw in Flex application development framework
A coding error in the Adobe Flex SDK could cause developers to create applications with cross-site scripting issues, according to an advisory issued by Adobe Systems. News | 01 Dec 2011
-
HTML 5 security issues pose challenges for enterprises, experts say
While the Adobe Flash replacement packages browser data more efficiently, HTML 5 security issues present holes that could be targeted by attackers. News | 30 Nov 2011
-
Web application risks exacerbated by social media ties, says ISACA
Asynchronous JavaScript Technology, XML, Flash and HTML 5 enable a rich Web experience, but also give attackers an alarming number of ways to penetrate corporate networks. News | 26 Oct 2011
-
Cigital BSIMM 3 study provides software security metrics data
The third iteration of the widely acclaimed Building Security in Maturity Model documents software security initiatives at 42 enterprises. News | 27 Sep 2011
-
Measurement first among secure software development benchmarks
One expert says before implementing secure software development benchmarks, take stock of the security of existing applications. News | 20 Sep 2011
Security Management Strategies for the CIO