The information security profession is at a crucial turning point as professionals scramble to develop new skills in the arenas of cloud computing, mobile applications and social media, a new survey shows.
Develop a strategy against the vulnerability of Web applications
Web applications are extremely flexible and valuable assets to any organization. But they're also vulnerable to threats like hijacking, splitting, forging and injection.
Read this white paper, "Designing a strategy for end-to-end Web protection",...
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
The National Institute of Standards and Technology issues NIST Special Publication 800-142: Practical Combinatorial Testing, a method aimed at cutting cost and increasing the effectiveness of software testing for many applications.