Tag: Best practices

RSA Conference 2016: AppSec Track Impressions

2 weeks ago I attended RSA Conference 2016 in San Francisco. I had the chance to attend multiple talks in the AppSec track and listen to what the other vendors, thought-leaders and experts had to say. In a nutshell, all talks and discussions revolved around how to get the developers engaged with the security process.

Read More »

HTML5 Security

All You Wanted To Know About HTML5 Security

With Google officially dropping Flash ad support in favor of HTML5, the security aspect of this relatively young programming and scripting language has become extremely crucial. Being a web-based application always invites cybercrime, which means that code integrity is very important. The following article will lay down the most important Application Program Interface (API) coding

Read More »

What’s HOT in Application Security Vol #40

Shape Security: Getting Down to the Root of Hacking When treating an illness, it is generally more effective to treat the source of the problem rather than the symptoms. Shape Security is trying to do the same in the field of website security. While all other products are geared towards a faster, cheaper, and better

Read More »

What’s HOT in Application Security Vol #29

More than half of all companies experienced a security breach in the past year and a half More than half of all companies in the world experienced some kind of security breach in the past 18 months; worrying statistic, given the level of damage a security breach can do to a company. The statement comes

Read More »

What’s HOT in Application Security Vol #17

PayPal to Grant Money for Reported Vulnerabilities Asking hackers to report security breaches they find without being rewarded doesn’t seem to work. There has to be some kind of an incentive. EBay, Amazon, Sony and now PayPal will provide security researchers who discover vulnerabilities in its website with money prizes. This encourages hackers to search

Read More »

What’s HOT in Application Security Vol #16

WHMCS still vulnerable after latest string of attacks WHMCS is a UK supplier of technical support and customer service is yet again the victim of a Ddos attack, due to its inability to mend an already known SQL Injection vulnerability. The embarrassment continued for the company in the days following where a hacker was auctioning

Read More »

Coding Security Into Applications – Secure SDLC

We wanted to share with you an excellent article written by Richard Janezic from midsizeinsider.com that covers the alarming state of application security, and how many of the current security vulnerabilities can be prevented by dedicating more thought into developing a secure coding methodology utilizing technologies that are available in the marketplace and considerably reduce the complexity

Read More »

Top 5 Apps to Keep Your Android Secure

Securing your data in an increasingly insecure world is no easy task. Backing up computer data,installing software that protects you from identity theft are just a few things we do to secure our data.  Think about it. Why wouldn’t you want to protect your Android Phone? It’s not only if you physically lose your phone

Read More »

Jump to Category