<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">
Alec Shcherbakov

Alec Shcherbakov

Recent Posts By Alec Shcherbakov

When Time Is Out - How Error Messages Can Give Hackers a

As people become more and more comfortable with shopping, banking, and communicating online they inevitably run into ...

Walls and Fences—Your Application Has a Security Perimeter

Defense in depth is an important security paradigm generally understood as multiple nested layers of protection ...

Handling Your Data Securely

Back to the basics, we revisit Alec's blog for a friendly reminder on Handling Your Data Securely. I love note-taking ...

Security and M&A: What’s Trending?

Security and M&A: What’s Trending? The pace of mergers and acquisitions has been steady over the last few years thanks ...

Internet Security and Encryption in the Age of Continuous

Almost every modern software application uses encryption to some extent. Authentication, storing data, transmitting ...

A Blog of the Past – Using Secure Managers for Passwords

Today we bring back a blog of the past. With the Yahoo Breach still a hot topic of cyber news we here at AsTech cannot ...

The Dangers of Lazy Remediation

A Forgotten Application I recently took part in a security assessment of a large Web application that was last reviewed ...

SAST and Secure Development Part 3

Our journey through the Land of Static Analysis continues as we explore the ways SAST tools can help developers to ...

Two-Factor Authentication: Not All Factors Are Created Equal

Strong authentication is inarguably one of the most powerful security controls available. Almost daily, we hear about ...

SAST and Secure Development - Part II

As I mentioned in the first installment of this series, the SAST tools go well beyond their primary goal — ...

SAST Tools and Secure Development - Introduction

Static Application Security Testing, or “SAST”, tools are making their way into the enterprise as more and more ...

Third Party Code: Elusive Security Fixes and Nesting Dolls

There was a time when a software application consisted of the code written by programmers specifically for that ...

Behind Many Doors—Part II: Strong authentication Can Be Cool

‘Tis the season to be jolly again for both consumers and merchants as millions flock to the stores in search for gifts, ...

The Virtues of Saving Less (Data)

Saving more is good. We all heard and read about the advantages of saving more money for various important goals in our ...

Shepherd Your Flock of Passwords

More Things To Consider When Choosing a Password Manager There was a time when there were no passwords. Then came the ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments