State of the Applications - Only 11% of Information Security Managers Feel...
According to a study conducted by Quotium, only 11% of Information Security Managers feel that their applications are secure, despite the fact that the vast majority of them are using a wide range of...
View ArticleAgile Application Security - The Fast Track to SDLC
With Agile development seeing software released at a fast and furious rate how can you be sure each release is safe? Learn about an efficient, effective, real and proven way to develop / deploy secure...
View ArticleInfographic - State of Application Security from a security manager perspective
An Infographic to summarize the findings of the last Quotium study on Application security market: Only 11% of security managers feels that applications in their organization are secure. The study also...
View ArticleHow to manage Application Security in the Software Development Lifecycle ?
This white paper discuss in detail why application security throughout the entire software development lifecycle is necessary for businesses of all shapes and sizes to prevent web security breaches and...
View ArticleSeeker 2.6 introduce an new vulnerability impact business intelligence engine...
In the age of Advanced Persistent Threats it is not sufficient to analyze vulnerabilities separately. Each vulnerability must be viewed as part of a larger threat context, as it would be by an attacker...
View ArticlePCI-DSS and Application Security - Achieving PCI-DSS Compliance with...
This paper discusses PCI DSS and the vital role it plays in building secure software applications. It will focus on specific requirements that deal with the protection and transmission of cardholder...
View ArticleFacebook Vulnerability Discloses Friends Lists Defined as Private
The vulnerability allows attackers to see the friends list of any user on Facebook to build an attack. This is carried out by abusing the ‘People You May Know’ mechanism on Facebook, which is the...
View ArticleWhen Applications Fail Data Security – Analysis of the JP Morgan Data Breach
Last Thursday, JP Morgan issued a warning to 465,000 holders of prepaid cash cards that their personal information may have been accessed by hackers who attacked the JP Morgan network in July. JPMorgan...
View Article13 important factors to consider when choosing an Application Security...
You face the process of selecting the right application security testing solution for your organization. Everybody agrees it should be part of the SDLC and ultimately used by developers, testers or...
View ArticleHow to Keep Security from being the Wet Blanket
It’s not a Bug, It’s a Hacker Oriented Feature ! It’s not easy to develop software these days. The process needs to be better, faster, agile. To achieve this, many development and testing tasks are...
View ArticleParkeon Chooses Quotium’s Seeker for Agile Code Security and PCI Compliance
The main issue with security scanners is that they need a substantial expertise to analyse reports and sort false positive. The correlation between vulnerabilities and impacted source code as well as...
View ArticleRisks of Testing Performance in Scaled down environments
Performance Testing, planned considering the capacity of the production environment, ideally should be performed well before the Go-Live date. It needs to be carried out in production like environment...
View ArticleHeartbleed, use Seeker to Check whether you are Vulnerable to one of the...
The best way however to ensure your applications are not vulnerable is by upgrading the OpenSSL package version to 1.0.1.g, and after that revoking and reissuing certificates. Your users may need to be...
View ArticleSimple Interfaces for Complex Technology
Although the majority of application security tools requires you to know the threats that confront you, most users do not have the security knowledge needed to recognize these threats, much less...
View ArticleLoad testing – Calculating the pacing time
Performance testing practitioners always aspire to achieve a production like scenario and once that is achieve a load that is steady enough during the execution of the test. Though steady load is not...
View ArticleAGILE Performance Testing: Best Practices
AGILE Methodologies and performance Testing: Best Practices
View Article‘Monitoring’ a key partner of ‘Testing’
I have worked with many mobile app developers and I have often come across scenarios wherein the clear difference between testing an app and monitoring an app is not clear to the developers. I am hence...
View ArticleBecause not all vulnerabilities were created equal...
Security is about risk management. It is rarely possible to address each and every threat at the moment it is discovered. For this reason it is important to bring context-awareness into the security...
View ArticleAgile development needs Agile security
Due to the compact cycles of software building and release that is fundamental to Agile, there is an opportunity to address software security and therefore application security very early and often in...
View Article5 principles to follow while doing Mobile Performance testing
Your business / app may have multiple functions and features that the end users would be using. Testing all of these features is never a requirement (and shouldn’t be targeted) in performance testing....
View ArticleInteractive Application Security Testing (IAST) Named by Gartner Analysts in...
Organizations are moving to Agile development, continuous integration and automation to keep up with growing user demands. With all business conducted online, attacks on applications are increasing in...
View ArticleContinuous Integration in Agile Development
One of the key principles of agile process is doing everything in small steps but continuously. That is, developing in small iterations, estimating small amounts of work and refactoring in small steps....
View ArticleSome key (yet funny) terminologies in AGILE Scrum
Agile has been the buzz word of the industry since 4-5 years now. It has turned around many businesses. It has not just drastically changed the cost side of the profitability tree but also improved...
View Article
More Pages to Explore .....