Secure Development Lifecycle

The following is an extensive library of security solutions articles and guides that are meant to be helpful and informative resources on a range of security solutions topics, from web application security to information and network security solutions to mobile and internet security solutions.

Code Security Analysis Security is a major aspect of business competitiveness today. A major attack on the enterprise can reduce productivity, tie up resources, harm credibility and cut into profits. Learn More

Cyber Security Many companies and countries understand that cyber threat is one of the most serious economic security challenges they face and that their economic prosperity depends on cyber security. Learn More

Ethical Hacking Computer hacking is a practice with many nuances. Intent, whether benign or malicious, is often in the eyes of the beholder. When examining the root cause of a website hack or application exploit, it pays to follow the money. Learn More

Facebook Security User's guide to Facebook Application Security. Get tips to protect your Facebook account from security flaws. Learn More

Firewall Security The term firewall originated to describe a building wall that offers physical protection from damaging fire. Firewall security technology, first introduced to computer networks in the late 1980s, protects private networks by securing gateway servers to external networks like the internet. Learn More

Flash Security Flash has a long record of critical security updates aimed at patching flash vulnerabilities and flash malware, but these issues continue to surface as more flash security issues are discovered. Learn More

Information Technology Infrastructure Library (ITIL) The Information Technology Infrastructure Library (ITIL) is an amassed collection of information that contains guidelines about how to create best practice infrastructure in the IT management of your organization. Learn More

Internet Security The internet represents an insecure channel for exchanging information, leading to a high risk of intrusion or fraud. Learn More

JavaScript Security JavaScript is a high-level, interpreted programming language that has been widely used since its release in 1995. Since its release, there have been several JavaScript security issues that have gained widespread attention. Learn More

Linux Hacking Linux is an open source operating system for computers. Linux is a Unix-like operating system, meaning that it supports multitasking and multi-user operation. Linux is widely used for supercomputers, mainframe computers and servers. Learn More

Packet Analyzer Packet analyzers are used to monitor, intercept and decode data packets as they are transmitted across networks. Learn More

Password Hacking Any way you look at it: your secret passwords are under attack. Computer hackers love to successfully defeat cryptography systems. Cybercriminals enjoy getting access to your online accounts. Learn More

Ruby Security Just like security applications with other frameworks, securing Ruby apps requires a mix of utilizing best practices in coding along with correctly using helper methods that are provided to help protect against certain types of attacks. Learn More

Secure Development With the vast amount of threats that constantly pressure companies and governments, it is important to ensure that the software applications these organizations utilize are completely secure. Learn More

Software Audit There are many ways to “audit” a software application. Indeed, the most basic kinds of software audits examine how the software is functionally configured, integrated or utilized within an organization. Learn More

Software Code Security The key to achieving superior software code security is to find a solution that can review large amounts of code as needed, in order to meet development timelines. Learn More

Software Development Lifecycle (SDLC) SDLC stands for software development lifecycle. A software development lifecycle is essentially a series of steps, or phases, that provide a model for the development and lifecycle management of an application or piece of software. Learn More

Software Security By testing for flaws in software, security testing solutions seek to remove vulnerabilities before software is purchased or deployed — and before the flaws can be exploited. Learn More

Software Testing Process As the enterprise network has become more secure, attackers have turned their attention to the application layer, which, according to Gartner, now contains 90 percent of all vulnerabilities. Learn More

Veracode Hacks Want to see how to upload your application, get your results, or find an eLearning course? Use these hacked demos to get started ... Learn More

Wireless Sniffer A wireless sniffer is a type of packet analyzer. A packet analyzer (also known as a packet sniffer) is a piece of software or hardware designed to intercept data as it is transmitted over a network and decode the data into a format that is readable for humans. Learn More

Data Security Resources

Data Breach Survival Guide
Ultimate Data Security Guide
Guide to Data Loss Prevention


Written by: