Internet Application Security News
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
September 17, 2012
Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.
Internet Application Security Get Started
Bring yourself up to speed with our introductory content
It's critical to apply security testing into your app, as cybersecurity affects everyone. Testing before production can help prevent attacks. Expert Gerie Owen explains further. Continue Reading
Cross-site scripting (XSS) is a security exploit which is carried out on Web applications that accept input, but do not properly separate data and executable code before the input is delivered back to a user’s browser. Continue Reading
A new programming language called Wyvern is helping developers use multiple languages in one app securely. Application security expert Michael Cobb discusses. Continue Reading
Evaluate Internet Application Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Testing data exchanges involves the ability to view, track and verify messages, among other things. Here are techniques for testing data exchanges. Continue Reading
Software testing expert Amy Reichert walks through the importance of MAM tools and options for developers looking for one. Continue Reading
An MAM tool should be selected based on comprehensive criteria that address security for personal devices with corporate data on them. Continue Reading
Manage Internet Application Security
Learn to apply best practices and optimize your operations.
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security ... Continue Reading
George Lawton looks at the best ways companies can maintain compliance through social media governance as business transactions move away from email. Continue Reading
Software development expert Dan Cornell discusses security issues, like third parties and data entering the application, found in social apps. Continue Reading
Problem Solve Internet Application Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As cloud services grow in popularity, enterprises must work with IT to decide what belongs in the cloud and how to secure it. Continue Reading
Today's enterprise app sec pro can be expected to work with as many as 200 programmers. Keeping up with the pace requires security automation. Continue Reading
Cloud computing security issues pop up when software QA pros play it fast and loose. Learn how to navigate threats and keep from getting burned. Continue Reading