Looking for something else?
Internet Application Security News
June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
September 17, 2012
Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.
January 27, 2012
"Smartphone" author Majeed Ahmad discusses present and future smartphone trends, including growing consumerization, democratization in the IT world, cloud computing and HTML 5. CIOs and other information technology buyers in the enterprise can ...
Internet Application Security Get Started
Bring yourself up to speed with our introductory content
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. The term is most often associated with scrambling plaintext (ordinary text, sometimes referred to as ... Continue Reading
Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website. The sites most ... Continue Reading
Video: VerSprite's Tony UcedaVelez explains how Web application threat modeling assesses Web risk and how it differs from penetration testing. Continue Reading
Evaluate Internet Application Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Software testing expert Amy Reichert walks through the importance of MAM tools and options for developers looking for one. Continue Reading
An MAM tool should be selected based on comprehensive criteria that address security for personal devices with corporate data on them. Continue Reading
Mobile app security is a newer field than even Web security. But there are similar gotchas and some common threats that we're already managing. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Internet Application Security
Learn to apply best practices and optimize your operations.
Software development expert Dan Cornell discusses security issues, like third parties and data entering the application, found in social apps. Continue Reading
Denial-of-service attacks may be impossible to prevent, but that doesn't mean there aren't ways to protect Web applications from them. Continue Reading
How can we best prevent hacking and user account lock out in Web applications with forms-based authentication? Continue Reading
Problem Solve Internet Application Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading
Today's enterprise app sec pro can be expected to work with as many as 200 programmers. Keeping up with the pace requires security automation. Continue Reading
Cloud computing security issues pop up when software QA pros play it fast and loose. Learn how to navigate threats and keep from getting burned. Continue Reading