Information Security Leader, Author, Instructor and Speaker

Default utility Image

ASP.NET authentication: Three new options for Web services TAGS: | Web developers migrating to ASP.NET are about to find themselves faced with new authentication options available for use in Web …Continue reading →

Default utility Image

Web application isolation TAGS: | Over the past few years, Web developers and administrators have become increasingly cognizant of the importance of Web application isolation. …Continue reading →

Default utility Image

Banish .htaccess from your Apache server TAGS: The Apache Web server provides administrators with an extremely flexible access control system that allows the delegation of access control …Continue reading →

Default utility Image

Securing the IIS metabase TAGS: Microsoft Internet Information Server (IIS) uses a centralized repository known as the metabase to store configuration information for the Web …Continue reading →

Default utility Image

Preventing SQL Injections TAGS: | Technical professionals responsible for the security of publicly accessible Internet servers often focus (justifiably) on maintaining the operating system and …Continue reading →