Skip to main content

Ian Broderick

Posts by Ian Broderick
  • Mobile Security Experts on BYOD

    Veracode Marketing recently polled a list of mobile security experts, asking them “What can employees do to minimize risk when bringing their own devices to work?” We’re pleased to present the responses from a wide array of security experts including David Schwartzberg from Sophos, Kevin Flynn from Fortinet and Veracode's own, Chris Wysopal. While all our experts have their unique perspectives,… READ MORE

Stay up to date on Application Security

  • Buffer Overflow - The Many Flavors of AppSec

    The end of the week is nearing again which means it's time for the final drink in our series "The Many Flavors of AppSec". So far you have seen the Anonymous, AppSec in the Cloud, SQL Injection and The Veracoder cocktails. This week we present the Buffer Overflow. Warning: Like a Buffer Overflow this drink may cause memory corruption and possible system crashes in large amounts! That's the final… READ MORE

  • What is Cross-Site Scripting?

    This is the first part of a series of talks given by Veracode co-founder and VP of Research Chris Eng. In this video Chris explains what Cross-Site Scripting is and how it enables an attacker to inject client-side script into web pages viewed by other users. The video can be viewed below. We have also transcribed the talk for your convenience. Cross-Site Scripting (XSS) is a vulnerability that… READ MORE

  • Insecure Cryptographic Storage Explained

    We recently recorded Veracode Security Researcher Chris Lytle discussing Insecure Cryptographic Storage. Insecure Cryptographic Storage is a common vulnerability that occurs when sensitive data is not stored securely. Protecting sensitive data by encrypting it should be a key step in a Secure Software Development Lifecycle. In this video Chris describes what Insecure Cryptography is and explains… READ MORE

  • Dangers of Scanning QR Codes: Interview with Eric Mikulas

    Eric Mikulas recently wrote an interesting article about the dangers of scanning QR codes. He conducted an experiment where he put up his own QR codes with no explanation of where they linked to, to see how many people would scan them. He found that a surprisingly large number of people scanned these unknown codes. We conducted an interview with Eric to get his opinion on the… READ MORE

  • Veracode is at Gartner Security Summit This Week!

    Veracode will be exhibiting and speaking at the Gartner Risk & Security Management conference in National Harbor, Maryland from Monday – Wednesday this week. If you’re at the Gartner event stop by and see us at Booth M and be sure to check out the session called Defending Beyond the Network: Building a Global Application Security Program presented by Veracode co-founder,… READ MORE

  • Mobile Testing Mindmap
    June 7, 2012
    Mobile Testing Mindmap

    Hi all, check out this interesting post from The Ministry of Testing about using MindMaps for mobile testing. The post gives a great example of how a MindMap created using an iPad can be used to plan out the testing of a new mobile product. This is a great way to ensure thorough methodical testing of mobile products. MindMaps could also be used for many types of testing. What uses do you find… READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.