Lessons Learned from the Facebook Breach: Why Logic Errors Are So Hard to Catch By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.
12 AppSec Activities Enterprises Can't Afford to Skip The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.
7 Steps to Start Your Risk Assessment Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.