Drive-By Downloads TAGS: malware | web security You’ve installed antivirus software on your computer and are careful to avoid sketchy websites. You should be safe from malware …Continue reading →
October 1, 2023
Drive-By Downloads TAGS: malware | web security You’ve installed antivirus software on your computer and are careful to avoid sketchy websites. You should be safe from malware …Continue reading →
Getting a Handle on Digital Certificates TAGS: digital certificates | encryption | web security It’s happened to all of us — at 4AM the phone rings and we find someone from operations on the …Continue reading →
Securing Your Website with Digital Certificates TAGS: digital certificates | encryption | web security Website users are trained to recognize the signs and symbols of a secure website — from the HTTPS in the …Continue reading →
WAFs, SDLC and PCI Compliance TAGS: network security | web application firewalls | web security Web applications remain one of the most vulnerable parts of our computing infrastructure. We’ve taken extraordinary measures over the past …Continue reading →
Defending against Firesheep: How to prevent a session hijacking attack TAGS: session hijacking | web security Session hijacking is a common form of attack against websites. Hackers using this attack are able to take advantage of …Continue reading →
Encrypting and securing websites with HTTPS TAGS: encryption | SSL | web security You might know that it’s possible to secure a website with encryption technology, but do you know what that “S” …Continue reading →
Product Review: Application Security Inc.’s AppDetectivePro TAGS: product review | web security AppDetectivePro fills a critical niche that goes beyond conventional vulnerability scanners, performing “deep dive” inspections of database configuration to identify …Continue reading →
Hacking the Vote: Information Security and the 2008 Presidential Election TAGS: elections | web security I had the opportunity to share my thoughts on the role that information security might play in the upcoming election …Continue reading →
Building application firewall rulebases TAGS: firewall | web security During the past decade, most enterprises have made significant investments in network and perimeter security. Organizations have tightened their controls …Continue reading →
Deal with cross-site scripting TAGS: web security Cross-site scripting is a serious security issue facing Web developers. This exploit allows malicious Web site operators to abuse the …Continue reading →