Application Security May 20, 2015 10 Convenient Ways to Increase Your Mobile Application Security Knowledge 4 min read - Here are 10 resources that will help professionals improve their knowledge and understanding of the state of mobile application security.
Application Security May 19, 2015 How to Enhance Your Cryptographic Key Protection 6 min read - Understanding how keys are hacked and the practices used to access this critical information can ultimately improve cryptographic key protection.
Application Security May 13, 2015 The Application Economy and the Challenges of the Internet of Things 5 min read - Are technologies such as the Internet of Things putting businesses at risk? Can the application economy create opportunities that can be safely harnessed?
Application Security May 6, 2015 Challenges to Running an Effective Application Security Program 4 min read - Effective application security requires developers to take part in a multistep process covering many aspects of coding and testing.
Application Security April 29, 2015 No Authentication Without Trust 3 min read - Identity authentication should only be conducted after the person trying to access data or information has been deemed trustworthy by the organization.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
April 17, 2015 Dropbox Bounty: Big Bucks for Bugs? 2 min read - The new Dropbox bounty program looks to catch software vulnerabilities in their infancy by rewarding researchers. So far, payouts have no maximum.
April 17, 2015 SearchBlox Vulnerabilities Underscore the Importance of Updating Enterprise Search Tools 2 min read - A set of four SearchBlox vulnerabilities could allow cybercriminals to conduct cross-site scripting attacks and cause other potential problems.
Endpoint April 13, 2015 Mobile Security Framework: How to Keep Enterprises Secure 3 min read - In order to combat potential data breaches, organizations must focus their attention on mobile security and bring-your-own-device policies.
Application Security April 13, 2015 Think You’re Immune From Mobile Malware Attacks? Think Again 4 min read - While users have improved when it comes to detecting possible threats on their computers, they may be less wary when it comes to their mobile devices.