Application security and coding requirements

News : Application security and coding requirements

View All News

In Depth : Application security and coding requirements

View All In Depth

Blog Posts : Application security and coding requirements

  • Singing the key management blues

    We need cryptographic keys, but who is going to manage them? How do you make an obscure topic like cryptographic key management interesting? And can you then persuade people to move this security ... Continue Reading

  • Just How Secure Are You?

    Back in the autumn of last year, I talked about a vendor – Bugcrowd – that doesn’t simply rely on AI and ML within a microchip, but actually uses real flesh and bone people (AKA ethical hackers) to ... Continue Reading

  • Time to act on "Authorised Payment" Fraud

    In 2014 a working group hosted by the DPA (Digital Policy Alliance) working with faster payment data from six banks established that 75% of fraudulent payments could have been stopped in real time ... Continue Reading

View All Blog Posts

Opinion : Application security and coding requirements

View All Opinion

Videos : Application security and coding requirements

  • CW500 Interview: Jonathan Moreira, CTO of PrimaryBid.com

    In this CW500 video, Jonathan Moreira, CTO of PrimaryBid.com, gives a fintech startup’s perspective on the security challenges small businesses can face when adopting new technologies.

  • Lauri Love: how reformed hackers halted the WannaCry virus

    Lauri Love presents a compelling story of the WannaCry malware that nearly brought down the NHS, and the behind the scenes work of former hackers, and security researchers that helped to prevent lives being lost. Love is facing extradition to the US after allegedly taking part in a hacking protest over the death of internet pioneer Aaron Swartz, who faced jail for using a hidden computer to downloading academic journals at MIT.

  • Screencast: Employ the FOCA tool as a metadata extractor

    Mike McLaughlin demos the FOCA tool as a metadata extractor to expose the 'hidden' data users often post on their own websites.

View All Videos
SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close