Internet Application Security News
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
September 17, 2012
Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.
Internet Application Security Get Started
Bring yourself up to speed with our introductory content
Cross-site scripting (XSS) is a security exploit which targets Web sites that accept user input but don't filter that input for common characters or strings used in scripts. Continue Reading
A new programming language called Wyvern is helping developers use multiple languages in one app securely. Application security expert Michael Cobb discusses. Continue Reading
For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin? Continue Reading
Evaluate Internet Application Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Testing data exchanges involves the ability to view, track and verify messages, among other things. Here are techniques for testing data exchanges. Continue Reading
Software testing expert Amy Reichert walks through the importance of MAM tools and options for developers looking for one. Continue Reading
An MAM tool should be selected based on comprehensive criteria that address security for personal devices with corporate data on them. Continue Reading
Product ReviewsPowered by IT Central Station
Enables developers and testers to quickly automate the user actions at the browser level, which also helps measuring the end user experience by measuring the browser rendering times.Powered by IT Central Station
Valuable Features: StormRunner Load reduces the overall time for performance testing engagement and is best suited for the products in agile...Continue Reading
We're able to create reusable data classes when using our test cases, and non-technical testers can automate tests with access to information.Powered by IT Central Station
Valuable Features: We like the idea of reusable data classes when we are using our test cases. We work with a lot of data, and so being able to...Continue Reading
We're able to check response times, including across different networks. Although, when it finds a problem with response times, it doesn't specify exactly where the problem is.Powered by IT Central Station
Valuable Features: The ability to and conceptualize the experience for users is great. Also, the price as the bang for your buck is good. I...Continue Reading
Manage Internet Application Security
Learn to apply best practices and optimize your operations.
George Lawton looks at the best ways companies can maintain compliance through social media governance as business transactions move away from email. Continue Reading
Software development expert Dan Cornell discusses security issues, like third parties and data entering the application, found in social apps. Continue Reading
Denial-of-service attacks may be impossible to prevent, but that doesn't mean there aren't ways to protect Web applications from them. Continue Reading
Problem Solve Internet Application Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading
Today's enterprise app sec pro can be expected to work with as many as 200 programmers. Keeping up with the pace requires security automation. Continue Reading
Cloud computing security issues pop up when software QA pros play it fast and loose. Learn how to navigate threats and keep from getting burned. Continue Reading