Download Netsparker

Web Application Security and the SDLC Discussed on the Virtualization and Cloud Security Podcast

Category: Web Security Readings - Tags: web application security , interview , video , automation , sdlc - Fri, 08 Jul 2016, by Robert Abela
Ferruh Mavituna, Netsparker's CEO talks about web application security automation and scalability with Edward Haletky in episode 17 of the Virtualizastion and Cloud Security Podcast. Read more...

Security Weekly and Ferruh Mavituna Talk Automation and Scaling Up Web Application Security

Category: Web Security Readings - Tags: web application security , web security automation , sdlc , scaling up , security weekly , interview - Mon, 23 Nov 2015, by Robert Abela
During episode #442 of Security Weekly, Ferruh Mavituna, Paul Asadoorian, Jeffrey Man and several other web security professionals talk about the challenges of automating web application security and how companies can scale up automated web application security scanning and scan 100s and 1000s of web applications with the least possible resources. Read more...

7 Common Web Application Development Security Misconceptions

Category: Web Security Readings - Tags: web application development , sdlc , secure web development - Thu, 24 Sep 2015, by Robert Abela
Are you a web application developer? How familiar are you with web application security? Read through these seven common web application development security misconceptions to make sure you don't fall for the trap and ensure you always cater for web application security in your work. Read more...

Getting developers on board to transition from part of the problem to part of the process

Category: Web Security Readings - Tags: web application security , web application secure development , sdlc - Wed, 14 Aug 2013, by Robert Abela
Are your web application developers key players in the web application security equation? They are often the unsung heroes who help prevent many security problems from ever occurring, or closing down web vulnerabilities once identified. Yet in the real world they are often portrayed as a large part of the security problem. It doesn’t have to be that way. Read more...

Follow us