Read more about OWASP
Bookmark and Share
  • Verify your software for security bugs

    28.11.2013

    Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing.

  • OWASP top 10 web application risks for 2013

    13.06.2013

    Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web application security and produced an awareness document that is acknowledged and relied on by organizations worldwide, including the PCI Council, DoD, FTC, and countless others.

  • Application vulnerabilities still a top security concern

    16.05.2013

    Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern.

  • The importance of secure coding

    07.05.2013

    Jim Manico is the VP of Security Architecture for WhiteHat Security.

  • Majority of web apps vulnerable to most frequent exploits

    26.04.2012

    84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, says security testing firm Veracode in a feature supplement of its annual "State of Software Security Report".




Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //