Common software security oversights can cause weaknesses you cannot afford to overlook. Kevin Beaver will share...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
with you just what you need to know in order to find the most Web security vulnerabilities that are important in your environment and specific steps you must take to go about finding them.
Contract obligations, concerns over whether features will provide ROI and poor management are some of the major factors holding back application security progress. Misaligned security focus has frustrated improvements in security, and while some concerns are realistic, others are far-fetched. Hear what a security consultant says is key in securing applications. Read the full story.
Web application security is something that affects practically every business in some capacity. Regardless of the industry you're in there are certain Web security weaknesses you cannot afford to overlook and specific steps you must take to go about finding them. Vulnerability scans are not enough. Source code scans are not enough. Manual analysis is not enough. You have to strike a good balance with all three in order to find the flaws that matter. In this webcast, independent information security expert Kevin Beaver will share with you just what you need to know in order to find the most Web security vulnerabilities that are important in your environment. He will outline what you need to do to properly plan out your testing, the tools you need to have in your arsenal, and the approach you must take when determining what to focus your efforts on to resolve the issues in a timely manner. View the webcast.
Listen to the podcast: Focusing on What's Important with Your Web Application Security: Scanning and Testing
About the author
Kevin Beaver is an information security consultant, expert witness, author, and speaker with Atlanta-based Principle Logic, LLC. With over 21 years of experience in the industry, Kevin specializes in performing independent security assessments revolving around compliance and minimizing information risks. He has authored/co-authored seven books on information security including the newly-updated Hacking For Dummies, 3rd edition. In addition, he's the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at his website www.principlelogic.com.