Internet Application Security

Email Alerts

Register now to receive SearchSoftwareQuality.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Application development: Security that won't weaken performance

    Security is important, but what happens when adding code to address security affects performance or usability? In this tip, SSQ contributor Crystal Bedell gives three best practices experts recommend for ensuring your application is secure, while sti... 

  • Overcoming the challenges of cross-site scripting testing

    Cross-site scripting (XSS) is the most common security vulnerability in the Internet today. In this tip, security expert John Overbaugh will explain what XSS is and will show techniques to test for these types of attacks. By using a combination of co... 

  • Application security: Testing for injection vulnerabilities

    A top security vulnerability in Web applications is an injection attack -- one in which the Web application is tricked into treating input as if it were code, allowing a hacker to gain control of an application. In this tip, security expert John Over... 

  • How to best security test your applications: Collaboration and outsourcing

    Security testing is an important factor in the application development process, and fortunately there are specialists who work to ensure that applications are as secure as possible. However, it can be difficult to know when it is necessary to outsour... 

  • Boost network security using firewalls, encryption and logging

    Which is more important, network or application security? Well, the answer, of course, is both. In this first part of a two-part series, security engineer John Overbaugh starts by describing the differences between network and application security, a... 

  • Application security: Protecting application availability, data confidentiality and integrity

    Network security and application security are both important in keeping your applications safe from hackers. In this tip, security engineer John Overbaugh focuses on application security, which is needed to protect the confidentiality, availability a... 

  • Strategies for optimizing browser compatibility testing

    In this expert response, consultant Karen Johnson describes strategies she uses for browser compatibility testing. Experience and knowledge of common vulnerabilities and developers' preferences can be helpful in knowing which areas to attack first. 

  • Embedded software test: Attack of the killer robots

    Embedded software can be found in all devices from planes to pacemakers, but how do we test this kind of software? What are the differences between testing embedded software and traditional application software? In this tip, site editor Yvette Franci... 

  • Penetration testing and other security testing techniques

    It can be hard to keep pace with the various types of security testing required in today's complex and often dangerous Web environment. In this response, expert John Overbaugh explains some of the most common and necessary security testing techniques... 

  • When and how to perform penetration testing

    Hackers are increasingly sophisticated in how they exploit weaknesses in network and Web application security. In this response, expert John Overbaugh explains the importance of penetration testing and how to ensure comprehensive security of your app...