Internet Application Security
- November 01, 2019
Atlassian's CISO believes that eventually, application security mechanisms will be absorbed completely into Agile and DevOps tools -- including his own company's products.
- August 22, 2019
The Confidential Computing Consortium mobilizes hardware vendors, cloud providers, developers and open source experts with the Linux Foundation to find ways to secure data in use.
- April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
- June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
- February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
- September 17, 2012
Security and development teams can share a common defect management tool with ThreadFix, Denim Group's new open source security tool.
- January 27, 2012
"Smartphone" author Majeed Ahmad discusses present and future smartphone trends, including growing consumerization, democratization in the IT world, cloud computing and HTML 5. CIOs and other information technology buyers in the enterprise can ...
- January 27, 2012
Explore smartphone and mobile computing technologies and services with expert Majeed Ahmad, author of a new book, Smartphone.
- October 17, 2011
Mobile ALM provider Keynote DeviceAnywhere and TomTom announced a partnership that enables real-time performance monitoring for TomTom mobile devices. This solution uses a cloud-based platform and provides developers with constant monitoring as well...
- June 02, 2009
Red Hat introduces new programming platform for upcoming next generation JAVA applications. Red Hat's three new products target diverse web applications in the multiple JAVA formats. This new platform will be able to communicate in various ...
- May 15, 2007
By applying a multilayered approach to application security throughout the SDLC, software ships more securely, closer to the scheduled delivery date and closer to anticipated cost. How do you do that? Joe Basirico, a senior security trainer at ...
- December 07, 2006
Web application threats increased significantly in 2006, and they aren't expected to let up. SPI Dynamics identifies which Web application trends will be security concerns in 2007.
- October 31, 2006
SQL injection is recognized as a major threat to application security, but what about other injection attacks? SPI Dynamics' Caleb Sima dissects these exploits and offers straightforward prevention techniques in this podcast.
- October 19, 2006
If there's one thing developers should do to increase Web applications security, it's input validation, according to Caleb Sima, founder and CTO of SPI Dynamics. In this interview, he discusses the most dangerous threats to Web applications, such ...
- August 30, 2006
Application logic attacks are common, dangerous and difficult to detect. In this interview, expert Rami Jaamour defines and analyzes logic attacks and provides in-depth security advice. As these threats become more popular, it is imperative to ...