By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Internet Application Security News
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
September 17, 2012
Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.
Internet Application Security Get Started
Bring yourself up to speed with our introductory content
LDAP injection is a type of security exploit that is used to compromise the authentication process used by some websites. Websites that construct Lightweight Directory Access Protocol (LDAP) statements from data provided by users are vulnerable to ... Continue Reading
Denial-of-service attacks disrupt legitimate access to organizational resources, often by overwhelming a network or resource with malicious traffic. Continue Reading
It's critical to apply security testing into your app, as cybersecurity affects everyone. Testing before production can help prevent attacks. Expert Gerie Owen explains further. Continue Reading
Evaluate Internet Application Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's easy to ignore the challenge of IoT and testing if that's not your job, but that's soon going to change. Expert Jennifer Lent explains what you need to know. Continue Reading
A new programming language called Wyvern is helping developers use multiple languages in one app securely. Application security expert Michael Cobb discusses. Continue Reading
Testing data exchanges involves the ability to view, track and verify messages, among other things. Here are techniques for testing data exchanges. Continue Reading
Manage Internet Application Security
Learn to apply best practices and optimize your operations.
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security ... Continue Reading
George Lawton looks at the best ways companies can maintain compliance through social media governance as business transactions move away from email. Continue Reading
Software development expert Dan Cornell discusses security issues, like third parties and data entering the application, found in social apps. Continue Reading
Problem Solve Internet Application Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Software testing is hard enough, but without adequate and appropriate equipment, it's unrealistic to expect accurate results. Expert Amy Reichert explains why QA needs more support. Continue Reading
Is it possible to build software speedily but safely? Startup CEO Mark Curphey thinks so, and he's using big data analytics to make open source code safe for developers everywhere. Continue Reading
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading