Email Alerts
-
Enterprise security in 2008: Building trust into the application development process
The Storm botnet, launched a year ago, proved that malicious hackers were developing more sophisticated botnets -- and more sophisticated business strategies. As Michael Cobb explains, it's just one reason why application security pros need to keep a... Tip
-
Cross-build injection attacks: Keeping an eye on Web applications' open source components
Web application developers' growing dependence on open source components has opened the door for attackers to insert malicious code into applications even as they are being built. Michael Cobb explores the emerging attack method called cross-build in... Tip
-
How to avoid dangling pointers: Tiny programming errors leave serious security vulnerabilities
For years, many have said that there is no practical way to exploit a dangling pointer, a common application programming error. But these software bugs should no longer be thought of as simple quality-assurance problems. Michael Cobb explains how th... Tip
-
Dynamic code obfuscation: New threat requires innovative defenses
Dynamic code obfuscation used to be a taxing effort, but now even the most junior-level malicious hackers have learned how to effectively hide their code. In this tip, Michael Cobb examines how dynamic code obfuscation works, why it's on the rise and... Tip
-
Ten dos and don'ts for secure coding
Security practitioners should understand how developers introduce security vulnerabilities into applications and work to support the developers in improving code quality and security. Encouragement and support for improvement must be a fundamental pa... Tip
-
The methodology of software creation/distribution
Learn what steps companies must follow to ensure the software they create and distribute is secure. Tip
-
Checklist for building better software
Learn how to reduce the number of security vulnerabilities introduced to software during the development process. Tip
-
Microsoft tossing money away
In its pursuit of more secure software, Microsoft announces $1 million in grants to support development advances, but it's unlikely to make a difference. Tip
-
Security issues of using shared code
Security pros need to be aware of code that is being "borrowed" for custom applications. Tip
-
Mini-tutorial: The Java security model
Mike Chapple takes a look under the hood of Java. Tip
Security Management Strategies for the CIO