Topic: prevoty

RASP: A new approach to protection

In most organizations today, the most precious assets (if not the most precious asset) are their applications (and the data they handle). Yet those same organizations protect their applications only from the outside. “Imagine a person who leaves his house always surrounded by bodyguards, because he cannot protect himself. He doesn’t have the skills or … continue reading

The secure software development life cycle

Even with all we know about cross-site scripting and SQL injections, these attacks on servers remain pervasive. Part of that is due to the fact that security technology (firewalls, signatures, past definitions) was not focused on these types of attacks. Another part is that developers have not embraced security as something that is their concern. … continue reading Protection Status