Application Security March 13, 2017 Inside the Mind of a Hacker: Attacking Web Pages With Cross-Site Scripting 5 min read - Web application developers must learn to think like cybercriminals to combat the growing threat of cross-site scripting (XSS) attacks.
Advanced Threats August 11, 2016 Impressions From DEF CON 24: The Machines Are Rising 5 min read - The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.
Application Security June 3, 2016 Inside the Mind of a Hacker: Attacking the Memory 4 min read - A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.
Application Security May 26, 2016 Inside the Mind of a Hacker: Attacking the Shell 4 min read - To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.
Application Security May 12, 2016 Inside the Mind of a Hacker: Attacking Databases With SQL Injection 4 min read - Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.
Application Security February 3, 2016 Is Your Smart Office Creating Backdoors for Cybercriminals? 5 min read - Companies must start paying attention to smart office security risks within their physical spaces in order to protect their building, employees and data.
Application Security May 6, 2015 Challenges to Running an Effective Application Security Program 4 min read - Effective application security requires developers to take part in a multistep process covering many aspects of coding and testing.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
Software Vulnerabilities April 8, 2015 The 10 Most Common Application Attacks in Action 4 min read - Based on OWASP's list of the 10 most common application attacks, IBM has created a video series highlighting each one and how organizations can stay safe.