This blog entry is about the OWASP Top 10 - 2017 and is primarily intended as an introduction for people commonly involved in software development and acquisition projects.
This blog entry introduces the OWASP Application Security Verification Standard (ASVS), which is a community-driven project to provide a framework of security requirements and controls for designing, developing and testing modern web applications and services. This text is primarily intended as an introduction for people commonly involved in software acquisition and development projects.
If you are worried about the state of security in your company but don’t really know where to start, then you should consider performing a security assessment to review the current state of your environment.
Do you implement applications that collect people’s personal data - name, phone number, email address, photos, videos, IP addresses - basically anything that can be connected to a person? Did you know that European Union-wide regulation could make your lovingly created application useless after May 2018?
Let’s zoom in on a classic challenge: how to combine Security Development Lifecycle (SDL) with an agile way of developing software.
The internet of things (IoT) and Industrial Internet of Things (IIoT) have been hot topics across many industries for the past years. Recent developments in pervasiveness of connectivity, advances in data science and machine learning as well as reductions in the cost and power consumption of hardware are now making it possible for companies to deploy IoT solutions more effortlessly and cost-efficiently than ever before. While there are many examples of IoT solutions generating tremendous value and cost savings for companies, many are still waiting to get started.
Developing a highly customized compiler is like being on board the Starship Enterprise.
Travelling deep into the microcosmos of the ARM architecture is nothing short of a journey into your own mind. To plot your uncharted course through the function nebulae unknown to the Vulcan database, to break alien code to subatomic particles and to re-assemble it again with a transporter function, to seek out new algorithms, to boldly go…
As a business or a service owner, you have all sorts of priorities. How high does software security rank on your list? Security is one of the cornerstones that can make or break your product.
In information security, military-grade systems are often viewed as the “Champions League” of the business. Think of sovereign state level resourcing, devoted security officers, fortified data centers designed to survive nuclear attacks, heavily armed guards, and so on. National security systems often use the strongest line of cyber defense known to man: strict physical isolation.