Software Integrity

Archive for December 2016

 

AngularJS 1.6: Life Outside the Sandbox

AngularJS 1.6 was recently released. With this release comes several impactful changes. One such change to note is the removal of the expression sandbox. This was a predicted change that was first announced in early September. If you haven’t already evaluated the impact of this on your Angular code in preparation for the changes, it’s […]

Continue Reading...

Posted in Software Security Testing, Threat Intelligence, Vulnerability Assessment | Comments Off on AngularJS 1.6: Life Outside the Sandbox

 

How to Assess the Risk of Seemingly Correct Software

As the prevalence of software continues to trend upwards with time, a common assumption is that it is becoming more feature-rich and reliable. However, most in the software industry wouldn’t hesitate to point out how difficult it actually is to achieve fully-working software. In fact, when calculating software risk, a key assumption is that it […]

Continue Reading...

Posted in Security Risk Assessment, Software Security Testing | Comments Off on How to Assess the Risk of Seemingly Correct Software

 

5 Security Industry Buzzwords We Love to Hate

Computing security is an interesting space. One of the main aspects that makes it interesting is that there are many security terms that are ambiguous. With some words, we have no idea why we’ve come to use them! While these buzzwords aren’t going away any time soon, here is a list of buzzwords that most of the […]

Continue Reading...

Posted in Cloud Security, Software Security Testing | Comments Off on 5 Security Industry Buzzwords We Love to Hate

 

SQL Injection Cheat Sheet: How to Prevent Attacks

SQL injection takes place when database software can’t tell the difference between arbitrary data from the user and genuine commands from the application. When an attacker injects commands into the data they send to a database, they can take database control away from the application owner. This can lead to data corruption, leaks of confidential […]

Continue Reading...

Posted in Software Security Testing, Vulnerability Assessment | Comments Off on SQL Injection Cheat Sheet: How to Prevent Attacks

 

Mark Your Calendar: RSA USA 2017 Is Almost Here

RSA Conference 2017 is taking place at the Moscone Center in San Francisco from February 13-17, 2017. While you’re there, be sure to stop by South Hall booth #1933 where we’ll be hosting prize giveaways, offering product demos, and setting up time to discuss our offerings in more detail. Also stop by to visit us at […]

Continue Reading...

Posted in Application Security, Mobile Application Security, Network Security, Web Application Security | Comments Off on Mark Your Calendar: RSA USA 2017 Is Almost Here