Application Security

Application Security | News, how-tos, features, reviews, and videos


security bug

Software security: There’s more to it than bug-bounty programs

Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Safeguard your code: 17 tips to develop more-secure code

Rigorous input testing, passwords, encryption—security is a feature no programmer can afford to overlook

cwan 013 6securityreasons win10
video

6 security reasons to upgrade to Windows 10

From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.

salted hash thumbnail multi final
video

Don't ignore application security | Salted Hash Ep 35

In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.

containers rust storage compartment shipping crates blue by boba jovanovic via unsplash

Deep container inspection: What the Docker Hub Minor virus and XcodeGhost breach can teach about containers

Trust and security are two separate concepts. This is especially true with container tools and images

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

CSO: Have you met these hackers? [slide 11]

Meet the modern software tester: Bug hunters profiled

Young men predominate as bug hunters, many of whom are gamers, work in IT or security, and have studied computer science.

CSO: Have you met these hackers? [slide 11]

How to start your own bug-bounty program

Code vulnerabilities and other entry points for hackers exist in your systems. Why not use hackers to help find and fix them?

mind the gap sign

5 security gaps introduced by hybrid IT

As enterprises evolve towards more use of cloud infrastructure and services, it will become increasingly necessary to mind the security gaps between traditional and cloud environments

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

Get started with Angular

A step-by-step guide to installing the tools, creating an application, and getting up to speed with Angular components, directives, services, and routers

Python megaguide: The best frameworks and IDEs

Only on InfoWorld: A hands-on, in-depth look at 13 Python web frameworks and six Python development toolkits

Quick guide: Digital transformation and the agile enterprise

Enterprise transformation is hard. But when you build a platform for continuous change, putting new ideas into production becomes a lot easier

Career hacks: Professional do’s and don’ts for developers

The hot skills to master, the secrets to breaking into management, the career mistakes to avoid -- here's how to refactor yourself as the developer every organization wants

ifw dd office 365

Deep Dive how-to: Office 365 document sharing

Office 2016, OneDrive, and Office 365 together offer powerful document collaboration capabilities across Windows, MacOS, iOS, Android, and the web -- but only if you set them up and manage them properly. This how-to guide walks you...

Machine learning megaguide: Amazon, Microsoft, Databricks, Google, HPE, IBM

Download InfoWorld's massive roundup of Amazon, Microsoft, Databricks, Google, HPE, and IBM machine learning toolkits

The Essential Guide to Microservices

How to create modern Web and mobile applications that scale.

Load More