Email Alerts
-
Realities of dealing with Web app security flaws
If you have Web apps, odds are you have Web app vulnerabilities. In this interview, Mike Rothman discusses what to do about them. Video | 01 Sep 2011
-
Black Hat 2011: Money for secure application development proves elusive
For most security teams, it’s still a struggle to find money for secure application development, according to a panel of Black Hat 2011 experts. News | 04 Aug 2011
-
New GrayWolf tool sheds light on Microsoft .NET application security
Black Hat 2011: A free Microsoft .NET application security tool helps programmers reverse-engineer .NET applications to manipulate and control them. News | 04 Aug 2011
-
Automated attack toolkits single biggest threat to Web apps, report finds
Automated attack tools are targeting directory traversal bugs, cross-site scripting errors, SQL injection flaws and remote file inclusion vulnerabilities. News | 26 Jul 2011
-
Gartner’s Ramon Krikken on Web application security scanners
In this video, learn how to get the most out of Web application security scanners, and the four key elements for a successful implementation. News | 23 Jun 2011
-
Zeus Technology announces art of defence acquisition
Zeus says the art of defence acquisition will boost its effort to provide Web application security for cloud computing deployments. News | 09 Jun 2011
-
Insecure Web apps pose serious security risks, survey finds
A survey of more than 600 IT security professionals finds nearly three quarters have been hacked at least once in the last 24 months through insecure Web applications. Article | 08 Feb 2011
-
TippingPoint Zero-Day Initiative fixes record number of vulnerabilities
The TippingPoint Zero-Day Initiative (ZDI) program fixed 300 vulnerabilities in 2010, triple the number of flaws repaired in 2009. Article | 27 Jan 2011
-
Mozilla proposes Firefox Do Not Track feature to boost browser privacy
The proposal, which transmits a special HTTP header to websites, may be supported in future versions of Firefox, but in order for it to fully work, websites must also support the feature. Article | 24 Jan 2011
-
Sandboxing technology bolsters security, but it has weaknesses, expert says
Adobe Systems, Google, Microsoft and others are deploying applications that use sandboxing technology to defend against potential attacks, but savvy hackers know how to bypass it. Interview | 18 Jan 2011
Security Management Strategies for the CIO