Application Security

Application Security | News, how-tos, features, reviews, and videos

spiral spring coil / cycles / iterations
blind spot side view mirror car vehicle

cyber security fingerprint digital protection authorization identification technology verification

How to use Auth0 with Node.js and Express

Learn how to add Auth0 log-in capabilities to a Node.js/Express app and use authenticated user info to show/hide UI information and secure APIs.

fingerprint login authorization cyber security circuit lock connection access

Solving authorization for software developers

We wouldn’t roll our own cloud orchestration or payment processing software. Why are we still building our own authorization infrastructure?

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

Go fuzz to catch hard-to-find bugs in Go

Native Go fuzz testing tool is now ready for beta testing but won’t be included in upcoming release of the language.

3 keychain keys

7 keys to selecting a low-code platform

These platforms offer great potential, but capabilities vary widely. Take time to study the options.

data security / padlock / binary code / digital display

What is unified policy as code, and why do you need it?

By decoupling policy from applications, policy as code allows you to change the coding for policy without changing the coding for apps. Translation: reliability, uptime, and efficiency.

Admission tickets in an digital network / access / admittance / authorization / authentication

Authorization is the next big technical challenge

Oso’s CEO says authorization will be the next layer of software to be abstracted and made less onerous for developers. If you ask developers, it can’t happen soon enough.

crash test dummies

Google’s OSS-Fuzz extends fuzzing to Java apps

Google’s open source fuzz testing project draws on Code Intelligence’s Jazzer to add support for Java and other JVM languages.

Tech Spotlight   >   Cybersecurity [IFW]   >   Hands at a keyboard with binary code on the display.

6 security risks in software development and how to address them

Experts share how software development teams can ‘shift security left’ and improve governance of using open source components, managing code, deploying services, and handling data.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

A magnifying lens examines top secret information amid binary code.

3 cloud architecture secrets your cloud provider won’t tell you

You may think you know everything about the proper configuration of a cloud computing solution, but cloud providers are keeping a few things to themselves.

cloud security ts

9 ways to build privacy into your cloud applications

Look to these strategies to balance privacy with functionality and protect your applications and data against attacks in the cloud

IDG Tech Spotlight  >  Security  >  Cybersecurity in 2020: From secure code to defense in depth

Cybersecurity in 2020: From secure code to defense in depth

CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation.

head / face / radiating lines / radial waves / artificial intelligence / projection / connection

AI, machine learning, and deep learning deep dive

Download this 26-page in-depth guide to AI, machine learning, and deep learning for easy reading at your convenience

Get started with Angular

A step-by-step guide to installing the tools, creating an application, and getting up to speed with Angular components, directives, services, and routers

Python megaguide: The best frameworks and IDEs

Only on InfoWorld: A hands-on, in-depth look at 13 Python web frameworks and six Python development toolkits

Quick guide: Digital transformation and the agile enterprise

Enterprise transformation is hard. But when you build a platform for continuous change, putting new ideas into production becomes a lot easier

Career hacks: Professional do’s and don’ts for developers

The hot skills to master, the secrets to breaking into management, the career mistakes to avoid -- here's how to refactor yourself as the developer every organization wants

ifw dd office 365

Deep Dive how-to: Office 365 document sharing

Office 2016, OneDrive, and Office 365 together offer powerful document collaboration capabilities across Windows, MacOS, iOS, Android, and the web -- but only if you set them up and manage them properly. This how-to guide walks you...

Load More