Videos Tagged with "Application Security"

68b48711426f3b082ab24e5746a66b36

Video: Do I Have to Secure All My Applications?

September 24, 2012

Attackers take advantage of any externally facing web application. If you think about a web application is not mission because it’s not touching data and if there is a SQL Injection vulnerability that exists in there attackers can use that to gain a foothold inside the network...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

What is Cross-Site Scripting?

July 19, 2012

In a XSS attack, JavaScript might steal session credentials, capture keystrokes or iterate across every form on a page and replace every action so that instead of submitting your username and password to the real application, the JavaScript causes your username and password to be sent to the attacker...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Securing Enterprise Communications Systems and Applications

April 27, 2012

Javvad Malik caught up with Rahul Sasi at Black Hat Europe 2012 to learn about securing automated enterprise communications systems and applications against sophisticated hacking attack techniques. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Forgotten Passwords and Security

February 03, 2012

What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Granular Application Control Drives Next Gen Firewalls

May 18, 2011

Web apps in particular have become a nightmare for IT staff. Should users be allowed to use Twitter, URL shorteners like bit.ly or ur1.ca, or even Facebook? And if they do what should they be allowed to do within the app? Posting updates is one thing. Playing Mafia Wars is another...

Comments  (0)

6d117b57d55f63febe392e40a478011f

RSA: Matt Alderman of Qualys Talks App Sec and the Cloud

February 22, 2011

Anthony M. Freed interviews Matt Alderman, Director of Product Management for Qualys. Matt has experience in solutions-oriented Governance, Risk Management and GRC, as well as directing a broad range of corporate compliance initiatives while designing, planning and implementing compliance solutions in direct support of client business objectives.

Comments  (0)