Tutorial

Common software security oversights school

Common software security oversights can cause weaknesses you cannot afford to overlook. Kevin Beaver will share with you just what you need to know in order to find the most Web security vulnerabilities that are important in your environment and specific steps you must take to go about finding them.

    Requires Free Membership to View

Why current application security measures fail and what you can do about it

Contract obligations, concerns over whether features will provide ROI and poor management are some of the major factors holding back application security progress. Misaligned security focus has frustrated improvements in security, and while some concerns are realistic, others are far-fetched. Hear what a security consultant says is key in securing applications. Read the full story.

Focusing on What's Important with Your Web Application Security: Scanning and Testing

Web application security is something that affects practically every business in some capacity. Regardless of the industry you're in there are certain Web security weaknesses you cannot afford to overlook and specific steps you must take to go about finding them. Vulnerability scans are not enough. Source code scans are not enough. Manual analysis is not enough. You have to strike a good balance with all three in order to find the flaws that matter. In this webcast, independent information security expert Kevin Beaver will share with you just what you need to know in order to find the most Web security vulnerabilities that are important in your environment. He will outline what you need to do to properly plan out your testing, the tools you need to have in your arsenal, and the approach you must take when determining what to focus your efforts on to resolve the issues in a timely manner. View the webcast.

Listen to the podcast: Focusing on What's Important with Your Web Application Security: Scanning and Testing

About the author

Kevin Beaver is an information security consultant, expert witness, author, and speaker with Atlanta-based Principle Logic, LLC. With over 21 years of experience in the industry, Kevin specializes in performing independent security assessments revolving around compliance and minimizing information risks. He has authored/co-authored seven books on information security including the newly-updated Hacking For Dummies, 3rd edition. In addition, he's the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at his website www.principlelogic.com.

This was first published in December 2010

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: