Since 1999

Cybersecurity Category

Covering all aspects of security, threats, and best practices.

10/03/2017

Automate Security Scans with Continuous Integration

Learn how to automatically run bundle-audit and brakeman in your CI suite with an example for TravisCI.

Read More ยป

09/18/2017

Equifax Missed Defense in Depth, Allowing a Massive Data Breach

More than bad patch management, the weakness was Equifax's failure to design with the assumption that the front-end web server would be compromised.

Read More ยป

09/05/2017

Engine Yard's 17 Rails Security Tips

Read More ยป

05/18/2017

Troubling ISP Privacy Repeal: The Data Will be Breached

With a green light from Congress & President Trump, your ISP may begin some really creepy business practices that endanger your family's privacy and security.

Read More ยป

02/28/2017

Breach Prevention for Developers Talk at Kennesaw State University

As an information security professional, itโ€™s critical to know something about how custom web applications are developed and the impact that has on application security.

Read More ยป

02/22/2017

Intro to App Sec Podcast Interview

Frank was the guest on the August 29, 2016, Intro to App Sec Episode of the Advanced Persistent Security podcast. Listen here.

Read More ยป

01/12/2017

The MongoDB hack and the importance of secure defaults

If you have a MongoDB installation, now would be the time to verify that it is secure. Tim Kadlec has written a must read post.

Read More ยป

11/02/2016

28th Anniversary of the Morris Internet Worm

Read More ยป

05/10/2016

Bad Password Practices are Responsible For Most Data Breaches. You Can do Better.

Verizon DBIR says 61% of data breaches are the result of bad password practices. Your app can avoid some of the pitfalls with a few precautions, especially using slow hashes and 2FA.

Read More ยป

03/16/2016

It is not just one iPhone, the FBI wants a future where it is impractical to deploy strong encryption without key escrow

The FBI wants a future where it is illegal or impractical to deploy strong encryption without key escrow, which is a key backup system that is insecure at scale. Data breach risks will increase as our devices become less secure.

Read More ยป