Application security

There’s no such thing as “done” with application security

Technology evolves so quickly that it requires you to constantly revisit your security to stay ahead of new vulnerabilities.

Understanding hackers: The insider threat

Companies often think of attackers as something that comes from the outside, yet overlook the far more dangerous threat: attackers from within.

Understanding hackers: The 5 primary types of external attackers

In order to defend, it’s important to understand who the attacker is and what motivates them.

Want to improve the security of your application? Think like a hacker

Explore the assumptions you’ve made about your application, and try to get the system to respond in ways it isn’t supposed to.

5 problems with securing applications

For many companies, getting started on securing their application is riddled with logistical and practical challenges.

Why you should build security into your system, rather than bolt it on

When you postpone security until later in the software development process, that delay costs you enormously in obvious and unexpected ways.

Why a skills shortage is one of the biggest security challenges for companies

Your company can’t have adequate security without skilled individuals making it happen, so what can you do to build the right security team?

How should your company think about investing in security?

Security isn’t cheap because it’s not easy. It requires a unique skill set, and it takes effort. But how much should you be investing in cybersecurity?

How to carry out a watering hole attack: Examples and video walkthrough

What is a watering hole attack, how do they work and what can you do to defend against them? Find out in this walkthrough from Infosec's Keatron Evans.

How cross-site scripting attacks work: Examples and video walkthrough

What are cross-site scripting attacks and how do they work? Find out in this walkthrough from Infosec Skills author John Wagnon.