Security can’t account for every last threat or vulnerability, but programmers should still strive for maximum protection … continue reading
Criminality, espionage, warfare and activism are the impetuses for today’s hackers … continue reading
The Metro interface will force at least some adaptation; meanwhile, what can we do to cut down on the same security holes? … continue reading
Frequently the biggest vulnerability of an application lies in the very code itself … continue reading
Common Weakness Enumeration version 2.0 highlights flaws in software development practices … continue reading
The third annual HP/Capgemini World Quality Report also points out increasing use of the cloud in developing economies … continue reading
Not enough attention has been paid to Web security yet; here are ways to check, and secure, your Web applications … continue reading
There are more than a few ways information can inadvertently slip out; here’s how to keep that from happening … continue reading
A lack of interest from upper management and a lack of education are contributing to potentially costly vulnerabilities … continue reading
Security experts warn that cybercriminals will be better able to take advantage of tactics that cover their tracks … continue reading
Fortify On-Demand is designed to protect applications running in cloud environments … continue reading
Stress tests on one’s security systems are best carried out by testers working for the company, not outsiders … continue reading