Application security and coding requirements

News : Application security and coding requirements

View All News

In Depth : Application security and coding requirements

View All In Depth

Blog Posts : Application security and coding requirements

  • Breaches You Don’t Hear About

    I think it’s fair to say that, over the decades, if the general public had been alerted to all the attempted terrorist attacks tracked down and prevented by intelligence – as opposed to just the ... Continue Reading

  • Singing the key management blues

    We need cryptographic keys, but who is going to manage them? How do you make an obscure topic like cryptographic key management interesting? And can you then persuade people to move this security ... Continue Reading

  • Just How Secure Are You?

    Back in the autumn of last year, I talked about a vendor – Bugcrowd – that doesn’t simply rely on AI and ML within a microchip, but actually uses real flesh and bone people (AKA ethical hackers) to ... Continue Reading

View All Blog Posts

Opinion : Application security and coding requirements

View All Opinion

Videos : Application security and coding requirements

  • CW500 Interview: Jonathan Moreira, CTO of PrimaryBid.com

    In this CW500 video, Jonathan Moreira, CTO of PrimaryBid.com, gives a fintech startup’s perspective on the security challenges small businesses can face when adopting new technologies.

  • Lauri Love: how reformed hackers halted the WannaCry virus

    Lauri Love presents a compelling story of the WannaCry malware that nearly brought down the NHS, and the behind the scenes work of former hackers, and security researchers that helped to prevent lives being lost. Love is facing extradition to the US after allegedly taking part in a hacking protest over the death of internet pioneer Aaron Swartz, who faced jail for using a hidden computer to downloading academic journals at MIT.

  • Screencast: Employ the FOCA tool as a metadata extractor

    Mike McLaughlin demos the FOCA tool as a metadata extractor to expose the 'hidden' data users often post on their own websites.

View All Videos
SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close