Securing the Application Layer
Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alike, businesses are...
View ArticleBest Practices in Application Security: ASACoE
The Application Software Assurance Center of Excellence (ASACoE) is a program that was jointly established by the Air Force and Telos in August of 2007. The Center’s mission is to establish software...
View ArticleInformation Security Is Like Football
When talking about football you often hear people stress the importance of “blocking and tackling.” This is just another way of saying we need to focus on the basics. The fundamentals of blocking and...
View ArticleSoftware Assurance Begins with Secure Development
I’d like to talk about software assurance (SwA) and its importance to application development. Which means I’d also like to talk about its importance to application developers. SwA isn’t a new...
View Article11 Design Principles for Secure Applications
Application Security – It Starts at Design The design phase is one of the major parts of the SDLC (software development life cycle). How well an application performs and meets its business goals is...
View ArticleAcquisition Based SwA – A Testament to the ASACoE
The Application Software Assurance Center of Excellence (ASACoE) performed their first software assurance (SwA) assessment for the Air Force in the fall of 2007. Since that time, the ASACoE has...
View ArticleWeb Maps – A Comparative Summary
Many institutions are already embedding data on top of digital map views using geographic information systems (GIS) to provide a common operating picture that helps users visualize, interpret and...
View ArticlePrivacy in the Mobile Space (with Recommended iOS 7 Settings for Better...
With the latest release of Apple’s mobile operating system, iOS 7, Apple provides a wide range of functionality enhancements and new feature sets that consumers can dive into – upgraded camera...
View ArticleSecuring the Application Layer
Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alike, businesses are...
View ArticleInformation Security Is Like Football
When talking about football you often hear people stress the importance of blocking and tackling--or focusing on the fundamentals of football. That same notion of mastering the fundamentals also...
View ArticleSoftware Assurance Begins with Secure Development
Developers are a smart lot. If we’re to ever get ahead of the game in securing applications, we must educate and challenge the development community to only write secure applications. The post Software...
View Article11 Design Principles for Secure Applications
Software applications come in all sizes -- from small embedded systems to large-scale enterprise systems. There are no hard rules or silver bullets regarding what security concerns should be considered...
View ArticleWeb Maps – A Comparative Summary
There are dozens of free map applications available on the Internet, providing basic capabilities. However, map services now extend more advanced functionalities and provide APIs that developers can...
View ArticlePrivacy in the Mobile Space (with Recommended iOS 7 Settings for Better...
With all of the iOS 7 enhancements, it’s easy to become distracted and overlook some of the key privacy settings that are conveniently defaulted to allow maximum exposure of the user’s sensitive...
View Article
More Pages to Explore .....