Looking for something else?
Web Services Security and SOA Security News
January 27, 2014
A researcher says Oracle hasn't properly addressed long-standing Oracle Forms and Reports flaws, which could be exploited to gain remote access.
October 25, 2011
Researchers in Germany have demonstrated weaknesses in the W3C XML encryption standard used to secure websites and other Web applications.
August 06, 2009
Codenomicon, a maker of security testing tools, finds multiple critical flaws in widely used XML libraries that could lead to denial of service attacks or injection of malicious code
April 21, 2009
While securing data in the cloud will remain an issue in the near term, researchers will develop ways to better protect data in the cloud, say a panel of cryptographers at the 2009 RSA Conference.
Web Services Security and SOA Security Get Started
Bring yourself up to speed with our introductory content
WS-Security and XML encryption are two essential elements of Web services security. In this XML encryption and WS-Security tutorial, which is a part of the SearchSecurity.com XML Web services tutorial, learn more about the security threats and ... Continue Reading
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
Evaluate Web Services Security and SOA Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn the advantages and disadvantages of using Open Authorization for Web application authentication. Continue Reading
As Executive Editor Dennis Fisher explains, developers and customers could stand to benefit with Web security tools built into larger development suites. Continue Reading
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Continue Reading
Product ReviewsPowered by IT Central Station
Technically good...too much administration required..one of the best reporting..poor customer supportPowered by IT Central Station
Valuable Features: Email web and DLP • Improvements to My Organization: Organisation of emails • Room for Improvement:...Continue Reading
Powered by IT Central Station
Valuable Features: We chose Cisco Iron Port as it delivers strong email security protection and our company needed it to protect the company's...Continue Reading
Powered by IT Central Station
Valuable Features: • Cost-effective since they do not require extra hardware • They are simple to plug into the available...Continue Reading
Manage Web Services Security and SOA Security
Learn to apply best practices and optimize your operations.
In this expert Q&A, platform security expert Michael Cobb explains how a secure FTP protocol can improve websites and Web services. Continue Reading
More and more workers are telecommuting these days, forcing enterprises to search for quality, cost-effective remote help desk support. In this SearchSecurity.com Q&A, application security expert Michael Cobb lays out some of your remote assistance ... Continue Reading
XPath injection attacks are slightly different (and more dangerous) than SQL injections. In this SearchSecurity.com Q&A, application expert Michael Cobb reveals the preventative steps that can protect your systems from either type of assault. Continue Reading
Problem Solve Web Services Security and SOA Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The recent Ruby on Rails security vulnerabilities can be patched. Expert Michael Cobb discusses the fallout and offers help with remediation planning. Continue Reading
In the wake of several recent MySQL zero-day vulnerabilities, expert Michael Cobb assesses the state of MySQL security. Is a MySQL alternative needed? Continue Reading
Expert Nick Lewis discusses proof-of-concept XML attacks and possible steps for defending data protected by XML encryption. Continue Reading