Security lesson: Beating web application security threats

Explore the importance of Web application testing processes and find suggestions on best practices with a webcast on scanning and testing Web application security, a podcast on security testing and a tip on Web application best practices in this lesson.

In this security lesson,information security expert Kevin Beaver explores the importance of Web application testing processes and offers suggestions on best practices. Find a webcast on scanning and testing Web application security, a podcast on security testing and a tip on Web application best practices in this lesson.

 

Webcast: Focusing on what's important with your Web application security -- Scanning and testing

The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This lesson delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. View the webcast.

 

Podcast: Web scanning security testing 

What should be the first step in Web application security testing? What is the difference between penetration testing, ethical hacking, vulnerabililty scanning and source code analysis? Security test expert Kevin Beaver answers these questions and others in this SSQ audiocast in which he explains how your organization can focus what's important in security test.

Play now:
Download for later:

Web scanning security testing

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As

 

Security best practices for today's Web applications

Web 2.0 and Rich Internet applications, though great functionality-wise, can place many complications in the way of Web security. In this tip, a Web security expert explains where problems can occur and what free tools are available to avoid issues.

 

About the author: Kevin Beaver is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing independent information security assessments revolving around compliance and information risk management. Kevin has authored/co-authored seven books on information security including the ethical hacking books, Hacking for Dummies and Hacking Wireless Networks for Dummies (Wiley). He's also the creator of the Security On Wheels IT security audio books.

This was first published in January 2011

Dig deeper on Internet Application Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close