Tag Archives: Authentication

HBGary hack: lessons learned

G:7-Security No matter the size of your company, you should have change management processes that require all changes to be approved by appropriate personnel. While a CEO can request to open a port on the firewall, a security person in … Continue reading

Posted in Cyber Security, Hacked | Tagged , , , , , , , , | Leave a comment

How Do You Build a Secure Web Application?

Securing Your Application To build secure Web applications, a holistic approach to application security is required and security must be applied at all layers. If you were to review and analyze the top security issues across many Web applications, you … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Leave a comment