Evan Wade

Evan Wade is a professional freelance writer, author, and editor from Indianapolis. His time as a sales consultant with AT&T, combined with his current work as a tech reporter, give him unique insight into the world of mobile/Web security and the steps needed to properly secure software products. Follow him on Twitter.
Posts by Evan Wade

Raise the Gates: 3 Tips for Stronger Password Security

February 23, 2015

Password security is one of the hottest, longest-standing topics in today's world of digital security, and it's no wonder: These single, self-contained words and phrases give users access to a wide breadth of info, powerful systems and functions that enterprise employees need in their daily jobs. Of course, all that power makes them points of intense interest for black-hat attackers and... READ MORE

Series Introduction: Performance and Scalability Keep You Safe at Any Size

February 6, 2015

There's a reason scalability is such an important concept on the development scene. When you've spent years devising and revising a set of practices, even small changes to the status quo can cause serious personnel-related and financial disruptions. That's why any support product that grows to meet an organization's expanding needs is instantly valuable to bean counters and code... READ MORE

Why Cloud Security Is the Undeniable Future of AppSec

February 2, 2015

If you work anywhere in the tech industry — and you are reading this blog post, after all — you probably have a good idea of the awesome stuff the cloud can do. From medical applications to advanced query processing to plain old communications, a lot of the tasks off-site computing platforms perform are darn near magical. But did you know the cloud's incredibly versatility extends... READ MORE

Exploit Profile: All About SQL Injection

January 26, 2015

You've heard it before, and you'll hear it again: SQL injection is no joke. Why the repetition? It's that serious a threat. As the number-one exploit on the OWASP Top 10 list of digital security issues (and one of the easiest attacks to successfully pull off), injection is a major tool for novice scripters and skilled hackers alike. With little more than basic knowledge and a... READ MORE

How to Choose a Third-Party Developer Based on Software Compliance and Safety

January 23, 2015

Hiring a third party to build your company's web apps (or pieces of them) may not be as difficult as putting the code together internally, but there can still be significant roadblocks involved. That's especially true when it comes to software compliance, and it becomes more challenging when a company knows little about the nuts and bolts of web app security. The good news? Bringing on a... READ MORE

Webinar Review: In Secure Agile Development, Why Can't We All Just Get Along?

January 20, 2015

Talk about agile with any waterfall-committed manager in the development industry, and you'll hear several reasons why maintaining status quo works better for her or him. You'll probably also hear this: Agile is fast, and probably better suited to how today's users consume software, but it just isn't as secure. The problem with that logic? It's all wrong. Spend an hour... READ MORE

The Dos and Don'ts of Building a Culture of Security

January 15, 2015

By now, you know implementing any office-wide change can be a challenge. More importantly, you know it's totally possible if you commit — and the results are more than worth the effort. But what does a security-focused workplace look like? What does it do? Here are three growing trends among successfully security-minded workplaces, along with three areas less-successful offices could... READ MORE

4 Steps to Implementing Expert Developer Training and Remediation Coaching

January 8, 2015

Coaching is important in almost any profession, and in a creative field like development, you can add modifiers like hugely, massively and immeasurably to that description. When instilling the right concepts is key to writing effective, secure code, there's no better way to approach it (and fix bad habits) than sitting down with the developers themselves. That said, knowing how to handle... READ MORE

Proactive Application Security: Get a Handle on These 3 Hot Spots

January 1, 2015

It's easy to paint a mental picture of the less-than-savory characters that make application security measures necessary, but you have to admit: they're clever. Security experts on the good-guy side often refer to efforts against their faceless antagonists using terms like "chess" and "cat and mouse." As soon as they fix the source of one exploit, they find another and... READ MORE

Information Security Consulting: Don't Call It "Outsourcing"

December 23, 2014

Attention, tech-industry decision makers: Outsourcing isn't necessarily the bad word you think it is. Those working in development and related fields certainly understand why businesses outsource, but there's no denying some people have formed bad associations with the concept over the years. From poor customer-service experiences and insurmountable language barriers to displaced jobs,... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu