Internet Application Security

  • April 27, 2015 27 Apr'15

    Data privacy lawyer explains 'data by design'

    Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.

  • June 05, 2013 05 Jun'13

    In software testing, 'perception is reality' is really a myth

    Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.

  • February 18, 2013 18 Feb'13

    PCI SSC introduces cloud compliance guidelines

    A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.

  • September 17, 2012 17 Sep'12

    ThreadFix: Open source defect management tool speeds security vulnerability fixes

    Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.

  • January 27, 2012 27 Jan'12

    Consumerization, cloud computing and HTML 5: The future of the smartphone

    "Smartphone" author Majeed Ahmad discusses present and future smartphone trends, including growing consumerization, democratization in the IT world, cloud computing and HTML 5. CIOs and other information technology buyers in the enterprise can ...

  • January 27, 2012 27 Jan'12

    Why smartphones play key role in “enterprise-ation” of mobile computing

    Explore smartphone and mobile computing technologies and services with expert Majeed Ahmad, author of a new book, Smartphone.

  • October 17, 2011 17 Oct'11

    Real-time performance monitoring for mobile apps

    Mobile ALM provider Keynote DeviceAnywhere and TomTom announced a partnership that enables real-time performance monitoring for TomTom mobile devices. This solution uses a cloud-based platform and provides developers with constant monitoring as well...

  • June 02, 2009 02 Jun'09

    JBoss lightens up its next generation platform

    Red Hat introduces new programming platform for upcoming next generation JAVA applications. Red Hat's three new products target diverse web applications in the multiple JAVA formats. This new platform will be able to communicate in various ...

  • May 15, 2007 15 May'07

    Application security shouldn't involve duct tape, Band-Aids or bubble gum

    By applying a multilayered approach to application security throughout the SDLC, software ships more securely, closer to the scheduled delivery date and closer to anticipated cost. How do you do that? Joe Basirico, a senior security trainer at ...

  • December 07, 2006 07 Dec'06

    Top Web application security threats for 2007

    Web application threats increased significantly in 2006, and they aren't expected to let up. SPI Dynamics identifies which Web application trends will be security concerns in 2007.

  • October 31, 2006 31 Oct'06

    Injection attacks -- Knowledge and prevention

    SQL injection is recognized as a major threat to application security, but what about other injection attacks? SPI Dynamics' Caleb Sima dissects these exploits and offers straightforward prevention techniques in this podcast.

  • October 19, 2006 19 Oct'06

    One simple rule to make your Web apps more secure

    If there's one thing developers should do to increase Web applications security, it's input validation, according to Caleb Sima, founder and CTO of SPI Dynamics. In this interview, he discusses the most dangerous threats to Web applications, such ...

  • August 30, 2006 30 Aug'06

    Prevent application logic attacks with sound app security practices

    Application logic attacks are common, dangerous and difficult to detect. In this interview, expert Rami Jaamour defines and analyzes logic attacks and provides in-depth security advice. As these threats become more popular, it is imperative to ...

  • August 10, 2006 10 Aug'06

    Ruby on Rails experiences serious security breach

    A security vulnerability has forced the creators of Ruby on Rails to issue an immediate upgrade. Version 1.1.5, which is being called a mandatory upgrade, is available now.

  • July 17, 2006 17 Jul'06

    Top attack methods against Web sites identified

    "Google" hacking and directed attacks such as SQL injection and cross-site scripting are the most dangerous attack methods Web sites face, according to a new study by Fortify Software.