Quantcast
Channel: Search Results For: domain:quotium.com
Browsing latest articles
Browse All 23 View Live

Image may be NSFW.
Clik here to view.

State of the Applications - Only 11% of Information Security Managers Feel...

According to a study conducted by Quotium, only 11% of Information Security Managers feel that their applications are secure, despite the fact that the vast majority of them are using a wide range of...

View Article



Image may be NSFW.
Clik here to view.

Agile Application Security - The Fast Track to SDLC

With Agile development seeing software released at a fast and furious rate how can you be sure each release is safe? Learn about an efficient, effective, real and proven way to develop / deploy secure...

View Article

Image may be NSFW.
Clik here to view.

Infographic - State of Application Security from a security manager perspective

An Infographic to summarize the findings of the last Quotium study on Application security market: Only 11% of security managers feels that applications in their organization are secure. The study also...

View Article

Image may be NSFW.
Clik here to view.

How to manage Application Security in the Software Development Lifecycle ?

This white paper discuss in detail why application security throughout the entire software development lifecycle is necessary for businesses of all shapes and sizes to prevent web security breaches and...

View Article

Image may be NSFW.
Clik here to view.

Seeker 2.6 introduce an new vulnerability impact business intelligence engine...

In the age of Advanced Persistent Threats it is not sufficient to analyze vulnerabilities separately. Each vulnerability must be viewed as part of a larger threat context, as it would be by an attacker...

View Article


Image may be NSFW.
Clik here to view.

PCI-DSS and Application Security - Achieving PCI-DSS Compliance with...

This paper discusses PCI DSS and the vital role it plays in building secure software applications. It will focus on specific requirements that deal with the protection and transmission of cardholder...

View Article

Image may be NSFW.
Clik here to view.

Facebook Vulnerability Discloses Friends Lists Defined as Private

The vulnerability allows attackers to see the friends list of any user on Facebook to build an attack. This is carried out by abusing the ‘People You May Know’ mechanism on Facebook, which is the...

View Article

Image may be NSFW.
Clik here to view.

When Applications Fail Data Security – Analysis of the JP Morgan Data Breach

Last Thursday, JP Morgan issued a warning to 465,000 holders of prepaid cash cards that their personal information may have been accessed by hackers who attacked the JP Morgan network in July. JPMorgan...

View Article


Image may be NSFW.
Clik here to view.

13 important factors to consider when choosing an Application Security...

You face the process of selecting the right application security testing solution for your organization. Everybody agrees it should be part of the SDLC and ultimately used by developers, testers or...

View Article


Image may be NSFW.
Clik here to view.

How to Keep Security from being the Wet Blanket

It’s not a Bug, It’s a Hacker Oriented Feature ! It’s not easy to develop software these days. The process needs to be better, faster, agile. To achieve this, many development and testing tasks are...

View Article

Image may be NSFW.
Clik here to view.

Parkeon Chooses Quotium’s Seeker for Agile Code Security and PCI Compliance

The main issue with security scanners is that they need a substantial expertise to analyse reports and sort false positive. The correlation between vulnerabilities and impacted source code as well as...

View Article

Image may be NSFW.
Clik here to view.

Risks of Testing Performance in Scaled down environments

Performance Testing, planned considering the capacity of the production environment, ideally should be performed well before the Go-Live date. It needs to be carried out in production like environment...

View Article

Image may be NSFW.
Clik here to view.

Heartbleed, use Seeker to Check whether you are Vulnerable to one of the...

The best way however to ensure your applications are not vulnerable is by upgrading the OpenSSL package version to 1.0.1.g, and after that revoking and reissuing certificates. Your users may need to be...

View Article


Image may be NSFW.
Clik here to view.

Simple Interfaces for Complex Technology

Although the majority of application security tools requires you to know the threats that confront you, most users do not have the security knowledge needed to recognize these threats, much less...

View Article

Image may be NSFW.
Clik here to view.

Load testing – Calculating the pacing time

Performance testing practitioners always aspire to achieve a production like scenario and once that is achieve a load that is steady enough during the execution of the test. Though steady load is not...

View Article


Image may be NSFW.
Clik here to view.

AGILE Performance Testing: Best Practices

AGILE Methodologies and performance Testing: Best Practices

View Article

Image may be NSFW.
Clik here to view.

‘Monitoring’ a key partner of ‘Testing’

I have worked with many mobile app developers and I have often come across scenarios wherein the clear difference between testing an app and monitoring an app is not clear to the developers. I am hence...

View Article


Image may be NSFW.
Clik here to view.

Because not all vulnerabilities were created equal...

Security is about risk management. It is rarely possible to address each and every threat at the moment it is discovered. For this reason it is important to bring context-awareness into the security...

View Article

Image may be NSFW.
Clik here to view.

Agile development needs Agile security

Due to the compact cycles of software building and release that is fundamental to Agile, there is an opportunity to address software security and therefore application security very early and often in...

View Article

Image may be NSFW.
Clik here to view.

5 principles to follow while doing Mobile Performance testing

Your business / app may have multiple functions and features that the end users would be using. Testing all of these features is never a requirement (and shouldn’t be targeted) in performance testing....

View Article

Image may be NSFW.
Clik here to view.

Interactive Application Security Testing (IAST) Named by Gartner Analysts in...

Organizations are moving to Agile development, continuous integration and automation to keep up with growing user demands. With all business conducted online, attacks on applications are increasing in...

View Article


Image may be NSFW.
Clik here to view.

Continuous Integration in Agile Development

One of the key principles of agile process is doing everything in small steps but continuously. That is, developing in small iterations, estimating small amounts of work and refactoring in small steps....

View Article


Image may be NSFW.
Clik here to view.

Some key (yet funny) terminologies in AGILE Scrum

Agile has been the buzz word of the industry since 4-5 years now. It has turned around many businesses. It has not just drastically changed the cost side of the profitability tree but also improved...

View Article
Browsing latest articles
Browse All 23 View Live




Latest Images