Playing the Part of Protector

Playing the Part of Protector

Implementing User Role-Based Security Testing For Enterprise Applications Security has become a critical issue at many levels, including access to individual computers, networks, services, applications and accounts. News reports of security breaches are all too...
If You Build It, They Will Come

If You Build It, They Will Come

As I write this, I’m thinking of last night’s midsummer classic—the 2007 All-Star Game—in which the National League was an extra base-hit away from a dramatic ninth-inning, come-from-behind win. But alas, the American League will again have home-field...
Don’t Leave Security for Last

Don’t Leave Security for Last

By integrating security assurance into the software lifecycle, you can improve product quality—and avert disaster! At the peak of the dot-com boom, my firm consulted extensively for large organizations concerned about the risks of Internet-based applications. My...