With new security features, is Dropbox safe for enterprises?

Web Application Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Improve Web application security with threat modeling

    By now, most information security practitioners agree that the industry-wide software development life cycle needs to improve, but there are concerns that these improvements will increase enterprises' costs. In this tip, Web security expert Michael C... 

  • PCI DSS Section 6: A plan for tackling application security

    Section 6 of the PCI DSS is currently a recommended "best practice," but in June 2008, corporations will be required to comply with the sections terms, which may leave some scrambling. In this tip, security expert Joel Dubin explains why its requirem... 

  • Making the case for Web application vulnerability scanners

    If a Web application scanner can find common SQL injection flaws, cross-site scripting vulnerabilities, buffer overflows and dangerous backdoors, then why aren't more enterprises using them? In this tip, Michael Cobb not only examines where the tools... 

  • Java security: Is it getting worse?

    Some say that Java security is no longer up to snuff, suggesting that the development language is a magnet for harmful threats such as cross-site scripting and SQL injections. In this tip, security expert Joel Dubin examines the current factors affec... 

  • Ensuring Web application security during a company merger

    When companies merge, so must their Web application infrastructures. Securing and integrating applications, however, can be a struggle without cooperation from all sides. In this tip, Michael Cobb explains how a merged organization can avoid turf bat... 

  • The dangers of application logic attacks

    Do you know how to prevent an application logic attack? In this tip, Web application security expert Michael Cobb explains how application logic attacks occur and offers tactics for protecting your Web applications. 

  • How simple steps ensure database security

    An enterprise database stores an organization's most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate the... 

  • Software security flaws begin and end with Web application security

    By now, developers are well aware that Web applications are vulnerable to an attack, though recent data indicates that the threat may be growing. In this tip, Michael Cobb offers insight as to why Web application vulnerabilities linger and provides d... 

  • Ajax security: How to prevent exploits in five steps

    While Ajax can make your Web pages feel faster and more responsive, this Internet-based service, like many Web development tools, has its security concerns. In this tip, SearchSecurity.com expert Michael Cobb examines how Ajax works, how hackers can ... 

  • CRLF injection attacks: How they work and what to do about them

    CRLF injection attacks may not be as popular as other application attacks, but they can be just as devastating. Learn how CRLF injection attacks are executed and how to defend your organization against these attacks.