Application security and coding requirements
News : Application security and coding requirements
-
August 18, 2016
18
Aug'16
Australian 2016 census sabotage puts a question mark on private cloud
Industry experts question why the Australian Bureau of Statistics’ website for the 2016 census, which recently underwent a DDoS attack, was not run on public cloud
-
August 03, 2016
03
Aug'16
UAE consumers not confident that their data is safe
Protecting customer data is a top priority for organisations in the Middle East as threat levels increase
-
August 02, 2016
02
Aug'16
Windows 10 Anniversary Update ramps up Defender security
Microsoft has added a full biometrics-powered password manager to support website authentication
-
July 26, 2016
26
Jul'16
No barrier to trial in UK, Lauri Love extradition hearing told
British hackers, including members of Anonymous, have been tried in the UK, despite causing serious damage to US computer systems, a court hears
In Depth : Application security and coding requirements
-
The true cost of a cyber security breach in Australia
The costs associated with a security breach can mount up and it is difficult to put a number on it, but organisations are increasingly trying to do this as attacks increase Continue Reading
-
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
CW500: Are you human or are you machine?
As more things become internet-connected, systems designed to authenticate people now need to deal with machine-to-machine authentication Continue Reading
Understanding behavioural detection of antivirus
This article in our Royal Holloway Security Series analyses the effectiveness and behaviour of 32-bit and 64-bit antivirus software in Windows 7.
Blog Posts : Application security and coding requirements
-
Black Duck cooks up extra security sauce
Black Duck has created a Centre for Open Source Research & Innovation (COSRI) at its Massachusetts headquarters. The firm is a specialist in 'automated' software for securing and managing open ... Continue Reading
-
TIBCO Mashery: APIs now have a 'lifecycle'
Data integration and analytics company TIBCO has released Mashery Enterprise API, essentially a piece of API management software supplied as a SaaS subscription. What is API management? In ... Continue Reading
-
Cigital: a new Agile (Security) Manifesto
Application security and software security consulting company Cigital says that its time for a new layer to be placed on top of the Agile Manifesto -- a set of principles that was released in 2001 ... Continue Reading
Opinion : Application security and coding requirements
-
Managing open-source security: a legal perspective
Open-source software is being used more widely than ever – but do IT leaders understand the legal risks? Continue Reading
-
Security Think Tank: Allocate maintenance processes to each piece of key software
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Using vulnerability management to support the patching process
What strategies can companies adopt to deal with the huge volume of software updates they are facing? Continue Reading
Videos : Application security and coding requirements
-
CW500 Video: Identity and access management – Gatwick Airport
In this CW500 video, Michael Ibbitson, CIO, Gatwick Airport, discusses the growing challenges of expanding access management to third parties and avoiding the potential pitfalls.
-
CW500 Video: Identity and access management - GDS
In this CW500 video, Janet Hughes, Head of Policy & Engagement for the Identity Assurance Programme, Government Digital Service, discusses the growing challenges of expanding access management to third parties and avoiding the potential pitfalls.
-
CW500 Video: Identity and access management - KPMG
In this CW500 video, Martijn Verbree, Director of Information Protection, KPMG, discusses the growing challenges of expanding access management to third parties and avoiding the potential pitfalls.
