The Mike Rothman Security Report

Understanding Web 2.0 Attacks

user-pic
Vote 0 Votes
In this month's Mike Rothman Security Report, Mike flies solo and rants a bit about Web 2.0 attack vectors. Since Web 2.0 is all the rage and you are hearing from folks you haven't spoken to since elementary school, Mike... Read More..
In this month's Mike Rothman Security Report podcast, Mike talks to Ted Julian of Application Security about database security. Given that most attacks are targeting the web applications to gain access to the database, we cover the importance of protecting... Read More..
In this month's Mike Rothman Security Report, Mike rolls up his sleeves with Nitesh Dhanjani of Ernst & Young to really dig into and understand the Cross Site Request Forgery (CSRF) attack. Nitesh goes through the mechanics of the attack,... Read More..
Learn more about secure coding from SearchSecurity.com *** Editor's Note: Don't miss a single important development in security by getting ebizQ's weekly security newsletter delivered straight into your inbox. Just check Security Update and leave your email right here. In... Read More..
There is nothing like becoming reacquainted with old friends, especially attack vectors that seem to rise from the dead and create mass hysteria and leave a trail of mayhem in its wake. No, Godzilla has not risen from the depths... Read More..
In this month's Mike Rothman Security Report, Mike and Jeremiah Grossman of White Hat Security take a deep dive into an application attack called SQL*Injection. This scourge is responsible for the mass, automated attacks that have been found compromising hundreds... Read More..
Listen to or download the 11:46 minute podcast below: Download file In this month's edition of the Mike Rothman Security Report podcast, Mike interviews blogger extraordinaire Alan Shimel of StillSecure, as they talk about the pro's and con's of security... Read More..
I've been following the security markets for close to 15 years at this point, and I continue to spot the same trends over and over again. You don't have to be too smart to figure out where things are going,... Read More..
***Editor's Note: If you're interested in the secure B2B identity architecture of tomorrow, make sure you sign up for the Federation and User Centric Identity webinar today! Listen to or download the 9:55 minute podcast below: Download file In... Read More..
***Editor's Note: If you're interested in the secure B2B identity architecture of tomorrow , make sure you sign up for the Federation and User Centric Identity webinar today! This month I want to dig a bit deeper into the... Read More..

ebizQ is proud to bring you Security Incite's Mike Rothman, who podcasts and writes on application security and related topics.

Recently Commented On

Monthly Archives

Blogs

ADVERTISEMENT