Tips
Tips
-
Penetration testing versus code review
Penetration testing and code review both have their advantages. Which application security method is more effective at finding critical vulnerabilities? Continue Reading
-
An inside look at XML encryption
At the core of Web services security is the ability to encrypt information sent out as XML documents, using XML encryption. Continue Reading
-
How to avoid authentication bypass attacks
Strong authentication methods may not fully protect your applications. George Wrenn offers some tips for avoiding authentication bypass attacks. Continue Reading