<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">

AsTech

Recent Posts By AsTech

The missing link in software security is . . . REMEDIATION!

We have tons of headlines for web sites and applications being hacked: celebrities’ accounts hacked, movies and scripts ...

Creating a Cyber-Secure Work Environment

Creating a Cyber-Secure Work Environment One of the largest problems that businesses face when dealing with cyber ...

A Blog of the Past – Missing Pieces – Mergers & Acquisitions

As the cyber security industry grows and data breaches continue to fill up the news, due diligence in mergers and ...

Build IT, Break IT, Fix IT

AsTech is proud to once again sponsor the Build-it, Break-it, Fix-it security-oriented programming contest through the ...

The Missing Piece in Mergers and Acquisitions Due Diligence

SAN FRANCISCO (February 25, 2016) — Hidden security flaws in software and network infrastructure pose great risks to ...

AsTech Breach Terminator Service: We’ll be back...

(Warning: The names have been changed to protect the innocent and since to y’all none of this happened, we’re not sure ...

What’s Remediation Got to Do with It?

In my first 20+ years as a developer, I heard the words “secure programming” used in a sentence, ahh . . . never. It ...

How to Talk to Developers About Remediation

¿Habla Developer? How many Information Security Professionals speak the same language that developers do? In my ...

Optimizing Vulnerability Discovery: A Hybrid Approach Works

The following post summarizes the content of a BrightTalk Webinar I presented a few months back, as part of a series on ...

Mapping the Application Security Terrain – Part Four

In our previous installment, we discussed the pros and cons of various application assessment strategies. To conclude ...

Mapping The Application Security Terrain – Part Three

In the last installment, we looked at different types of automated application security analysis tools, such as ...

Mapping the Application Security Terrain – Part Two

In the previous blog post a high level overview of the application security space was presented. In Part Two below, ...

Mapping the Application Security Terrain - Part One

Network perimeter security has become more and more effective as products and services have matured. Internet ...

Selecting the Right Fraud Event Management Solution (or How to

How do you stop online fraud? It's not a problem that is going to go away any time soon. According to the Cybersource ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments