New & Notable
Internet Application Security News
August 22, 2019
The Confidential Computing Consortium mobilizes hardware vendors, cloud providers, developers and open source experts with the Linux Foundation to find ways to secure data in use.
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
June 05, 2013
Reality isn't always what we perceive it to be. In this installment of Quality Time, we examine the reality behind some common misperceptions.
February 18, 2013
A branch of the Payment Card Industry Security Standards Council has released guidelines designed to clarify the murky rules of cloud compliance.
Internet Application Security Get Started
Bring yourself up to speed with our introductory content
A SQL injection (SQLi) is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order to gain access to unauthorized resources or make changes to sensitive data. Continue Reading
A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources. Continue Reading
Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Continue Reading
Evaluate Internet Application Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's easy to ignore the challenge of IoT and testing if that's not your job, but that's soon going to change. Expert Jennifer Lent explains what you need to know. Continue Reading
A new programming language called Wyvern is helping developers use multiple languages in one app securely. Application security expert Michael Cobb discusses. Continue Reading
Testing data exchanges involves the ability to view, track and verify messages, among other things. Here are techniques for testing data exchanges. Continue Reading
Manage Internet Application Security
Learn to apply best practices and optimize your operations.
GitHub made moves in 2018 and 2019 to broaden and deepen its user base. Learn the major changes that users should know before committing code on the platform. Continue Reading
Application security testing requires users to test from all the right perspectives. Discover testing techniques that help find application security flaws with expert Kevin Beaver. Continue Reading
Developers, we get it; you don't want to deal with the network. But hear us out, as a basic understanding of subnets, VPNs and IP addresses boost app stability and performance. Continue Reading
Problem Solve Internet Application Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
To prevent cross-site scripting attacks, software developers must validate user input and encode output. Review characters to filter out, as well as sources and sinks to avoid. Continue Reading
For developers, security is not often a high priority -- but it should be. Automated security scanning tools can help detect and address weaknesses before evildoers discover them. Continue Reading
Software testing is hard enough, but without adequate and appropriate equipment, it's unrealistic to expect accurate results. Expert Amy Reichert explains why QA needs more support. Continue Reading