DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Implementation Patterns For Software Security Programs

Every organization’s software security program implementation is different, but patterns exist providing guidance to those looking to plan for their program rollouts. This…

Technology The Magic of Symbiotic Security

Throw out everything that you know about security tools today. No more six-figure appliances that only do one thing marginally well. No more proprietary protocols. We deserve…

Technology Benchmarking Web Application Scanners for YOUR Organization

Web applications pose significant risks for organizations. The selection of an appropriate scanning product or service can be challenging because every organization develops…

Technology XSS Remediation

Cross-Site Scripting was #2 in the OWASP Top 10. Do you know how to remediate for it?

Technology Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers

Far too often application security decisions are made in an ad hoc manner and based on little or no data. This leads to an inefficient allocation of scarce resources. To…

Technology Application Security Program Management with Vulnerability Manager

Using free Java-based software, application security managers can now have increased visibility into and control of enterprise security programs as well as the data that…

Technology Web Application Remediation - OWASP San Antonio March 2007

This presentation covers best practices for organizations looking to remediate software and application security vulnerabilities they have identified in their application…

Technology What I Wish I Knew Before Starting A Web Application Security Project

1. What I Wish I Knew Before Starting a Web Application Security Project February 4th, 2010 2. Thoughts • Windsurfing Is Hard (Application Security Is Harder) • Savagely…