Internet Application Security News
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
September 17, 2012
Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.
Internet Application Security Get Started
Bring yourself up to speed with our introductory content
A new programming language called Wyvern is helping developers use multiple languages in one app securely. Application security expert Michael Cobb discusses. Continue Reading
For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin? Continue Reading
The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user. The more surface there is, the better the chance an attacker or a piece of malware can use ... Continue Reading
Evaluate Internet Application Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Testing data exchanges involves the ability to view, track and verify messages, among other things. Here are techniques for testing data exchanges. Continue Reading
Software testing expert Amy Reichert walks through the importance of MAM tools and options for developers looking for one. Continue Reading
An MAM tool should be selected based on comprehensive criteria that address security for personal devices with corporate data on them. Continue Reading
Product ReviewsPowered by IT Central Station
Enables developers and testers to quickly automate the user actions at the browser level, which also helps measuring the end user experience by measuring the browser rendering times.Powered by IT Central Station
Valuable Features: StormRunner Load reduces the overall time for performance testing engagement and is best suited for the products in agile...Continue Reading
We're able to create reusable data classes when using our test cases, and non-technical testers can automate tests with access to information.Powered by IT Central Station
Valuable Features: We like the idea of reusable data classes when we are using our test cases. We work with a lot of data, and so being able to...Continue Reading
Very rich automation/test management framework but consider the coding needed to integrate with your applicationPowered by IT Central Station
Recently, I was asked a set of questions regarding my experience with TOSCA. Here are the questions and my answers: General info: Is...Continue Reading
Manage Internet Application Security
Learn to apply best practices and optimize your operations.
Software development expert Dan Cornell discusses security issues, like third parties and data entering the application, found in social apps. Continue Reading
Denial-of-service attacks may be impossible to prevent, but that doesn't mean there aren't ways to protect Web applications from them. Continue Reading
How can we best prevent hacking and user account lock out in Web applications with forms-based authentication? Continue Reading
Problem Solve Internet Application Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading
Today's enterprise app sec pro can be expected to work with as many as 200 programmers. Keeping up with the pace requires security automation. Continue Reading
Cloud computing security issues pop up when software QA pros play it fast and loose. Learn how to navigate threats and keep from getting burned. Continue Reading