Converged storage

Internet application vulnerabilities News

View All News

Internet application vulnerabilities Get Started

Bring yourself up to speed with our introductory content

  • An intro to automated penetration testing

    In this exploratory article, expert Mike Chapple explains what automated penetration testing is, why it is useful and how to start building an enterprise penetration tester toolkit. Continue Reading

  • SmartScreen

    SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7's Internet Explorer 8, SmartScreen uses a whitelist of trusted sites collected from the surfing data of other IE SmartScreen users. Continue Reading

  • Mitigating the enterprise risks posed by PHP SuperGlobal variables

    Learn the risks PHP SuperGlobal variables present to PHP applications and how to mitigate them in an enterprise environment. Continue Reading

View All Get Started

Evaluate Internet application vulnerabilities Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Internet application vulnerabilities

Learn to apply best practices and optimize your operations.

  • Open source Web apps: Spotting security flaws

    Don't assume that your open source Web apps are secure. Expert Kevin Beaver explains the common vulnerabilities and how to include these systems in your security testing. Continue Reading

  • Secure testing: Making software safe

    Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security missteps, it's essential to plan early and carefully.

    This handbook looks at various secure testing strategies to ensure software safety now. In the first article, Gerie Owen covers the basic security measures to avoid getting hacked and advocates the importance of thinking like a hacker. In part two, Valerie Silverthorne views security from an Agile development perspective and examines how to reduce software vulnerabilities. Finally, Amy Reichert-Browerstock closes out the handbook with website penetration testing techniques for a regular testing cycle and how to check for security defects at the start of a test cycle. Guarantee protected software with these security actions.

     Continue Reading

  • Targeted Cyber Attacks

    In this excerpt of Targeted Cyber Attacks, authors Aditya Sood and Richard Enbody outline the cyberattack model and different vectors used to attack targets. Continue Reading

View All Manage

Problem Solve Internet application vulnerabilities Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve