<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">

Losing your Memory to Fortify – Tips on Memory Usage

It seems that no matter how much support you get from the vendors of these complicated test tools, there may still be ...

Quick and Easy Fortify Scans

Over the years, I’ve occasionally run security scans on projects that were buildable using Maven or Ant. Those of you ...

More Adventures in Pentesting

I was recently given three iOS applications on which to conduct penetration tests. I took the applications’ .ipa files ...

The Value of Manual Testing

Vendors want companies to think their automated vulnerability scanner is a turn-key solution to all their security ...

Sensitive Information in the Online World

Your Information on the Internet With more of our lives on the internet than ever, the coming generations only look to ...

The Many Frustrations of Being Cert Blocked

The other day, I was conducting a penetration test of a client’s software and ran into the following errors: Firefox ...

Plain HTTP, Postcards and HTTPS - Part 3

What Does HTTPS Get Me Then?

Plain HTTP, Postcards and HTTPS - Part 2

Encryption 101

Plain HTTP, Postcards and HTTPS - Part 1

Recent Training Feedback

Little Boxes | Vulnerability Assessment

Who remembers this song, written by Malvina Reynolds, and made famous by Pete Seegar (among others)? Little boxes on ...

Integrating Vulnerability Management into Bug-Tracking

I am sure many of you will agree that one of the biggest challenges in Application Security is ensuring that developers ...

The missing link in software security is . . . REMEDIATION!

We have tons of headlines for web sites and applications being hacked: celebrities’ accounts hacked, movies and scripts ...

What does the relationship between Information Security and

. . . and how do you organize for it? Information Security. Cyber Security. Aren’t they the same? If not, don’t they ...

The Layer 8 Problem

For years, the OSI Model has been the standard for describing the way data moves from the wires and cables in the walls ...

Cyber Security: A Cost Difference of Millions

So you’ve put in some time into your infrastructure security, and you’ve reached the point of looking into ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments