Email Alerts
-
Using fuzzing for internal application security testing
Superstar security researchers often use fuzzing to find flaws in major vendors' applications, and you can use fuzzers to find vulnerabilities during internal software development. Expert Michael Cobb explains how. Ask the Expert
-
Should VMware vulnerabilities in JRE impede implementing virtualization?
Could recent VMware vulnerabilities in JRE hamper virtualization implementation? In this expert response, Michael Cobb explains that VMware attacks are theoretical at this point and shouldn't stop you from implementing virtualization if your risk ass... Ask the Expert
-
Can secure FTP services protect sensitive data from hackers?
Does secure FTP services protect against hackers and attacks? In this expert response, Michael Cobb explains why using a secure FTP service is vital for handling sensitive data transfers. Ask the Expert
-
What patch management metrics does Project Quant use?
In this Q&A, expert Michael Cobb reviews the open patch management metrics model called Project Quant. Ask the Expert
-
Are Web application penetration tests still important?
Web application penetration tests continue to be an important part of the secure software development lifecycle process in order to reduce the number and severity of security-related design and coding errors. Ask the Expert
-
How to detect input validation errors and vulnerabilities
Expert John Strand reviews how to spot input validation flaws on your websites. Ask the Expert
-
Is a Master Boot Record (MBR) rootkit completely invisible to the OS?
Whether or not we see widespread attacks that use MBR rootkits will depend upon two factors. Platform security expert Michael Cobb explains them both. Ask the Expert
-
Is attack code valuable for vulnerabilities or just a publicity stunt?
If a security company has developed attack code for a particular vulnerability, there will always be critics that cry "PR stunt." Expert Michael Cobb explains why the vulnerabilities should always be taken seriously. Ask the Expert
-
Can threat modeling help enterprises?
In this expert response, Ed Skoudis explains how threat modeling can determine an organization's greatest threats and associated risks. Ask the Expert
-
Can dynamic and static verification secure a platform?
The best software testing approach is to use a combination of static and dynamic verification tools that continually check for technical and logical vulnerabilities during the development cycle. Expert Michael Cobb examines each testing procedure in ... Ask the Expert
Security Management Strategies for the CIO