Building Security In Using Continuous Integration

Coveros recently published an article in the March/April 2010 edition of CrossTalk. The article is entitled “Building Security In Using Continuous Integration.” Building security into software is harder than it should be. This article explores a way to align application security practices with other software development best practices in order to make building security in […]

Read more
Coveros Increases 2009 Revenue 135%

13 New Customers Drive Corporate Growth in a Down Economy Fairfax, Va., February 22, 2010 — Coveros, the market leader in the delivery of secure, reliable software, announced today that it achieved record growth in 2009, increasing revenue 135% over 2008. The company’s success is driven by significant new business growth in both the commercial […]

Read more
OWASP Top 10 – SQL Injection

As of my last article on XSS, the OWASP organization has released a new Top 10 for 2010 and has placed injection attacks in the number 1 spot. Now that XSS and SQL injection flaws have flipped spots, I will continue the article series using the new Top 10 list. You can find the new OWASP Top 10 […]

Read more
OWASP Top 10 – Cross-Site Scripting (XSS)

In my introductory article, I discussed explaining each vulnerability in the OWASP Top 10 for you. The first on the list is Cross-Site Scripting (XSS). Websites today are very advanced and they contain lots of dynamic content. Dynamic content is information on a web site that is generated on the fly. Dynamic content is usually seen on forums, […]

Read more
Three Questions Developers Need To Ask

While performing software security assessments I have all too often run into developers that are constantly trying to explain away vulnerability findings. They spend way too much time trying to justify the code they have written and explain why it doesn’t need to be changed. All kinds of reasons are given. For example, the access […]

Read more
Web Application Security: OWASP Top 10

The Open Web Application Security Project (OWASP) is a worldwide community focusing on improving the security of web applications. One project developed by OWASP is the OWASP Top 10, which is a list of the most serious web application vulnerabilities. Obviously, there are innumerable ways to hack a web application but this list contains the most common and […]

Read more
We want your feedback for SecureCI!

Do you have ideas for the next version of SecureCI? Is some tool or feature missing that would make the product better? Something we could have done differently that would make it more useful? We’ve set up a forum at uservoice to make it easy for you to give us feedback. Whether it is a suggestion, new […]

Read more
Code Analysis with PMD

PMD is a static code analysis tool that examines Java source files and can detect potential problems such as code style issues, code defects, race conditions and even security holes. It provides an inexpensive way to avoid the tedium of repeatedly reviewing a large code base. PMD can also find other types of problems, such as, dead […]

Read more
X