MORE FROM THIS AUTHOR
An Introduction to the Digital Black Market, or as also known, the Dark Web
Have you ever wondered about what happens in the digital black market, or as better known the dark web? Do you know how easy it is for someone who does not have any security experience to buy a tool that can find vulnerabilities in websites and exploit them automatically? Read this article for more detailed information of how the dark web evolved and about the things you and anyone else can do with just a little bit of money.
Using Netsparker To Comply With The OWASP Application Security Verification Standard When Developing Web Applications
The OWASP Application Security Verification Standard is a set of standards developed by OWASP to help developers write more secure code and web applications. This article explains how an automated web application security scanner such as Netsparker can help you comply with OWASP ASVS and develop more secure web applications.
Passwords vs. Pass Phrases – Innovation and Evolution
This third and last password paper looks into new innovations and evolution of passwords and authentication mechanisms. It looks into what other options there are available should we opt for something more secure than passwords and pass phrases.
How Can I Expand the Forced Browsing Attack List?
This FAQ explains how you can expand or use your own list for the Forced Browsing security check in Netsparker Desktop web application security scanner.
Passwords vs. Pass Phrases – Weaknesses Beyond the Password
Using strong passwords is not enough, the whole system should be built well to ensure that the underlying technology can survive a data breach, when, and not if it happens. In fact a modernized approach to password ideology is only one of the several necessary steps for a highly-secured system
Passwords vs. Pass Phrases - An Ideological Divide
The concept of passwords is very old and the more efficient offline password crackers are becoming, the more difficult it is for users to come up with complex passwords. This whitepaper looks into how efficient complex passwords are and highlights other alternatives to complex passwords.
PCI Compliance - The Good, The Bad, and The Insecure - Part 2
In this second part of the compliance article, the author explains in detail how each and every category in the PCI DSS requirements should be dealt with to ensure that your websites, web applications and also business are operating securely. This is the definitive guide to PCI DSS compliance every business and organization should read.
PCI Compliance - The Good, The Bad, and The Insecure
In this first part of a two part article about PCI compliance and web application security, the author looks into the history of compliance, rules and regulations and explores the common shortcomings of such rules. The author also explains why there are such shortcomings and explains that by being compliant, does not necessarily mean having secure web applications.
Shared Hosting and Web Application Security - The Opposites
Shared hosting might be an affordable solution for many businesses and startups, but because of the way shared hosting works web application security is not in your control. Read about all the pitfalls of shared web hosting and what you should look for when choosing a hosting provider for your web applications.