SECURE DEVELOPMENT LIFECYCLE
The following is an extensive library of security solutions articles and guides that are meant to be helpful and informative resources on a range of security solutions topics, from web application security to information and network security solutions to mobile and internet security solutions.
Code Security Analysis Security is a major aspect of business competitiveness today. A major attack on the enterprise can reduce productivity, tie up resources, harm credibility and cut into profits.
Cyber Security Many companies and countries understand that cyber threat is one of the most serious economic security challenges they face and that their economic prosperity depends on cyber security.
Ethical Hacking Computer hacking is a practice with many nuances. Intent, whether benign or malicious, is often in the eyes of the beholder. When examining the root cause of a website hack or application exploit, it pays to follow the money.
Facebook Security User's guide to Facebook Application Security. Get tips to protect your Facebook account from security flaws.
Firewall Security The term firewall originated to describe a building wall that offers physical protection from damaging fire. Firewall security technology, first introduced to computer networks in the late 1980s, protects private networks by securing gateway servers to external networks like the internet.
Flash Security Flash has a long record of critical security updates aimed at patching flash vulnerabilities and flash malware, but these issues continue to surface as more flash security issues are discovered.
Information Technology Infrastructure Library (ITIL) The Information Technology Infrastructure Library (ITIL) is an amassed collection of information that contains guidelines about how to create best practice infrastructure in the IT management of your organization.
Internet Security The internet represents an insecure channel for exchanging information, leading to a high risk of intrusion or fraud.
Linux Hacking Linux is an open source operating system for computers. Linux is a Unix-like operating system, meaning that it supports multitasking and multi-user operation. Linux is widely used for supercomputers, mainframe computers and servers.
Packet Analyzer Packet analyzers are used to monitor, intercept and decode data packets as they are transmitted across networks.
Password Hacking Any way you look at it: your secret passwords are under attack. Computer hackers love to successfully defeat cryptography systems. Cybercriminals enjoy getting access to your online accounts.
Ruby Security Just like security applications with other frameworks, securing Ruby apps requires a mix of utilizing best practices in coding along with correctly using helper methods that are provided to help protect against certain types of attacks.
Secure Development With the vast amount of threats that constantly pressure companies and governments, it is important to ensure that the software applications these organizations utilize are completely secure.
Software Audit There are many ways to “audit” a software application. Indeed, the most basic kinds of software audits examine how the software is functionally configured, integrated or utilized within an organization.
Software Code Security The key to achieving superior software code security is to find a solution that can review large amounts of code as needed, in order to meet development timelines.
Software Development Lifecycle (SDLC) SDLC stands for software development lifecycle. A software development lifecycle is essentially a series of steps, or phases, that provide a model for the development and lifecycle management of an application or piece of software.
Software Security By testing for flaws in software, security testing solutions seek to remove vulnerabilities before software is purchased or deployed — and before the flaws can be exploited.
Software Testing Process As the enterprise network has become more secure, attackers have turned their attention to the application layer, which, according to Gartner, now contains 90 percent of all vulnerabilities.
Veracode Hacks Want to see how to upload your application, get your results, or find an eLearning course? Use these hacked demos to get started ...
Wireless Sniffer A wireless sniffer is a type of packet analyzer. A packet analyzer (also known as a packet sniffer) is a piece of software or hardware designed to intercept data as it is transmitted over a network and decode the data into a format that is readable for humans.
Data Security Resources
Written by: Fergal Glynn