GitLab Discloses Critical Vulnerability, Provides Patch by Sergio De Simone Posted on May 04, 2016
Remotely Exploitable Java Zero Day Exploits through Deserialization by Alex Blewitt Posted on Nov 07, 2015 8
Cambridge Study Analyzes State of Android Security by Sergio De Simone Posted on Oct 22, 2015
LinkedIn Release QARK to Discover Security Holes in Android Apps by Abel Avram Posted on Aug 27, 2015
Critical Flaw Allows Remote Code Execution on Internet Explorer by Jeff Martin Posted on Aug 19, 2015
Symantec Claims Zero Day Flash Vulnerability Likely to be Exploited by Alex Blewitt Posted on Jul 08, 2015 1
Heartbleed’s Aftermath: OpenBSD Developers Start Purifying OpenSSL by Jeff Martin Posted on Apr 21, 2014
Heartbleed allows dumping client and server memory remotely by Alex Blewitt Posted on Apr 09, 2014 1
Patterns and Anti-Patterns for Scalable and Available Cloud Architectures by Jonathan Allen Posted on Apr 02, 2014
Adam Wick on Security, Formal Methods, Types, Unikernels, HaLVM, DRM
Jan 08, 2016
Adam Wick talks about software security, research into formal methods and randomisation as well as documentation and types to help write secure software, HalVM and other Unikernels, DRM.
Weaving Security into the SDLC
Oct 28, 2015
Bill Sempf discusses security in the context of the SDLC, presenting the analysis results from reviewing several code sources, the problems found and the corresponding solutions.
Application Security What You Don't Know Can Hurt You
Jun 20, 2014
Joe Kuemerle discusses some of the top threats that can break an app along with techniques to improve the design of an application to minimize vulnerabilities and mitigate what cannot be removed.
Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats by Aaron Beuhring and Kyle Salous Posted on Mar 17, 2015 1
Employing Enterprise Architecture for Applications Assurance by Walter Houser Posted on Feb 26, 2015
Application Security Testing: The Double-sided Black Box by Rohit Sethi Posted on Feb 26, 2013 1
Comparison of Intrusion Tolerant System Architectures by Quyen L. Nguyen and Arun Sood Posted on Nov 25, 2011 1
Virtual Panel: Security Considerations in Accessing NoSQL Databases by Srini Penchikala Posted on Nov 15, 2011 2
Enhanced Detection of Malware by Carlos Rozas, Hormuzd Khosravi, Divya Kolar Sunder,and Yuriy Bulygin Posted on Sep 30, 2009