Software Requirements Gathering Techniques
- June 06, 2006
The recent prosecution of so-called white hat hackers is fueling a debate over the future of security researchers and acceptable ethics in cyberspace.
- May 05, 2006
The SANS Institute says many critical flaws are appearing in programs long considered to be safe alternatives to Windows. Apple's reputation, in particular, "is in tatters."
- May 01, 2006
Web applications need a layered approach to tackling security. Most organizations have deployed this at at the infrastructure level, but now experts say it's time to apply that approach to application security as well.
- March 06, 2006
IBM has introduced a new component to its Identity Management Services that monitors employees' online behavior and flags suspicious activity.
- March 01, 2006
The best way to ensure software is secure is to build security into the software development life cycle, industry experts say. Design-time threat modeling is pivotal, but it needs to be constrained by an understanding of the business risks involved.
- January 09, 2006
Secure authentication methods for Web applications are discussed in this chapter of the OWASP Guide to Building Secure Web Applications and Web Services. Java and .NET are both covered. SAML, biometrics, SSL, forms-based authentication and other ...
- January 09, 2006
OWASP Guide to Building Secure Web Applications and Web Services, Chapter 22: Denial of Service Atta
This section of the OWASP Guide to Building Secure Web Applications and Web Services will help you make sure the application is robust as possible in the face of denial of service attacks.
- January 06, 2006
It isn't enough to secure the physical network. Today, criminals are focusing on exploiting vulnerabilities in applications. This report, written by Jim Zimmerman from Techra LLC, looks at the top application security vulnerabilities and how to deal...