Select Page

OWASP AppSec Tutorial Series

Here is a list of videos published in YouTube about application security. It is a great compilation of video and a must to watch for the application developers and application security professionals alike. All these videos are great tutorials for any AppSec...

Identity Protection Services

Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies are on sale after such security incidents. When looking for a Identity Protection company, it is important to check out the services offered by them....

Cloud Security Report–Spring 2014

The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based on the analysis of data from its customer base of around 2200 active customers. A key finding is that the increase in cloud & hosting environment...

Whitelisting in Java

Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts start recommending disabling the Java whenever possible. Now Java has come up with the option for whitelisting so that you can run Java in a safer...

Encryption and Security, think again

NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes the strategies by NSA on the exploitation of the implementation flaws in some of the popular crypto products. It also discusses about the cases of NSA made companies to...