Quantcast
Channel: application security – TelosVision
Browsing all 14 articles
Browse latest View live

Securing the Application Layer

Application security has been a steadily growing focus area of enterprise information security programs.  Following many security breaches, affecting small and large corporations alike, businesses are...

View Article



Best Practices in Application Security: ASACoE

The Application Software Assurance Center of Excellence (ASACoE) is a program that was jointly established by the Air Force and Telos in August of 2007.  The Center’s mission is to establish software...

View Article

Information Security Is Like Football

When talking about football you often hear people stress the importance of “blocking and tackling.”  This is just another way of saying we need to focus on the basics.  The fundamentals of blocking and...

View Article

Image may be NSFW.
Clik here to view.

Software Assurance Begins with Secure Development

I’d like to talk about software assurance (SwA) and its importance to application development.  Which means I’d also like to talk about its importance to application developers.   SwA isn’t a new...

View Article

Image may be NSFW.
Clik here to view.

11 Design Principles for Secure Applications

Application Security – It Starts at Design The design phase is one of the major parts of the SDLC (software development life cycle).  How well an application performs and meets its business goals is...

View Article


Image may be NSFW.
Clik here to view.

Acquisition Based SwA – A Testament to the ASACoE

The Application Software Assurance Center of Excellence (ASACoE) performed their first software assurance (SwA) assessment for the Air Force in the fall of 2007.  Since that time, the ASACoE has...

View Article

Image may be NSFW.
Clik here to view.

Web Maps – A Comparative Summary

Many institutions are already embedding data on top of digital map views using geographic information systems (GIS) to provide a common operating picture that helps users visualize, interpret and...

View Article

Image may be NSFW.
Clik here to view.

Privacy in the Mobile Space (with Recommended iOS 7 Settings for Better...

  With the latest release of Apple’s mobile operating system, iOS 7, Apple provides a wide range of functionality enhancements and new feature sets that consumers can dive into – upgraded camera...

View Article


Securing the Application Layer

Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alike, businesses are...

View Article


Information Security Is Like Football

When talking about football you often hear people stress the importance of blocking and tackling--or focusing on the fundamentals of football. That same notion of mastering the fundamentals also...

View Article

Software Assurance Begins with Secure Development

Developers are a smart lot. If we’re to ever get ahead of the game in securing applications, we must educate and challenge the development community to only write secure applications. The post Software...

View Article

11 Design Principles for Secure Applications

Software applications come in all sizes -- from small embedded systems to large-scale enterprise systems. There are no hard rules or silver bullets regarding what security concerns should be considered...

View Article

Web Maps – A Comparative Summary

There are dozens of free map applications available on the Internet, providing basic capabilities. However, map services now extend more advanced functionalities and provide APIs that developers can...

View Article


Privacy in the Mobile Space (with Recommended iOS 7 Settings for Better...

With all of the iOS 7 enhancements, it’s easy to become distracted and overlook some of the key privacy settings that are conveniently defaulted to allow maximum exposure of the user’s sensitive...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images