Internet Application Security

Email Alerts

Register now to receive SearchSoftwareQuality.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Embedded software test: Attack of the killer robots

    Embedded software can be found in all devices from planes to pacemakers, but how do we test this kind of software? What are the differences between testing embedded software and traditional application software? In this tip, site editor Yvette Franci... 

  • Penetration testing and other security testing techniques

    It can be hard to keep pace with the various types of security testing required in today's complex and often dangerous Web environment. In this response, expert John Overbaugh explains some of the most common and necessary security testing techniques... 

  • When and how to perform penetration testing

    Hackers are increasingly sophisticated in how they exploit weaknesses in network and Web application security. In this response, expert John Overbaugh explains the importance of penetration testing and how to ensure comprehensive security of your app... 

  • Security requirements for any Web application

    When verifying security on your Web application, there are some general considerations that everyone should check off the list. Expert John Overbaugh offers insight into application security standards and steps your team can take while developing you... 

  • Security testing early in the software development lifecycle

    While it seems that testing in the production environment is the most crucial, there are also several important aspects of application security testing that should take in the early phases of development. In this expert response, John Overbaugh descr... 

  • How network security and application security are related

    Network security is ever-changing and fast-paced, and many software developers may wonder what is necessary for them to know about network security, application security and programming languages to best protect their applications from hackers. In th... 

  • Verifying user authentication and data encryption in your Web service

    Application security is a tricky aspect of development, and it’s usually best to rely on the professionals to authenticate users and encrypt data. However, there are steps development teams can take to validate that these processes are being performe... 

  • Application testing for international release

    When testing applications for international functionality, you must take several important factors into consideration. In this response, expert Karen Johnson offers strategies for application testing with respect to various foreign languages, currenc... 

  • Application security hardening for mobile and embedded software

    With the increasing number of mobile devices and application downloads by consumers, application security is becoming more important than ever. In this tip, application hardening tools and the use of obfuscation is discussed. Industry analysts talk a... 

  • Security lesson: Beating web application security threats

    Explore the importance of Web application testing processes and find suggestions on best practices with a webcast on scanning and testing Web application security, a podcast on security testing and a tip on Web application best practices in this less...