In this security lesson,information security expert Kevin Beaver explores the importance of Web application testing...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
processes and offers suggestions on best practices. Find a webcast on scanning and testing Web application security, a podcast on security testing and a tip on Web application best practices in this lesson.
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This lesson delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. View the webcast.
What should be the first step in Web application security testing? What is the difference between penetration testing, ethical hacking, vulnerabililty scanning and source code analysis? Security test expert Kevin Beaver answers these questions and others in this SSQ audiocast in which he explains how your organization can focus what's important in security test.
Download for later:
- Internet Explorer: Right Click > Save Target As
- Firefox: Right Click > Save Link As
Web 2.0 and Rich Internet applications, though great functionality-wise, can place many complications in the way of Web security. In this tip, a Web security expert explains where problems can occur and what free tools are available to avoid issues.
About the author: Kevin Beaver is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing independent information security assessments revolving around compliance and information risk management. Kevin has authored/co-authored seven books on information security including the ethical hacking books, Hacking for Dummies and Hacking Wireless Networks for Dummies (Wiley). He's also the creator of the Security On Wheels IT security audio books.