New & Notable
Secure application development Get Started
Bring yourself up to speed with our introductory content
Independent and interoperable microservices require a permissions rethink, or you'll drive users crazy. Examine how tokens come into play for authentication and authorization. Continue Reading
Despite the benefits, microservices will introduce profound security issues. We review the biggest microservices security challenges and four strategies used to combat them. Continue Reading
OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet. Continue Reading
Evaluate Secure application development Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Compare and contrast the mobile testing tools from the big three cloud vendors -- AWS Device Farm, Google Firebase Test Lab and Microsoft Visual Studio App Center Test. Continue Reading
Manage Secure application development
Learn to apply best practices and optimize your operations.
The flipside of microservices agility is the resiliency you can lose from service distribution. Here are some microservices resiliency patterns that can keep your services available and reliable. Continue Reading
The traditional method of application change control won't fly in a modern, DevOps environment. Here's how we can rethink the process in a time where rapid app development rules. Continue Reading
While big companies get the headlines, small businesses are more often the targets of attacks on web applications. We examine what might be keeping SMBs from proper security. Continue Reading
Problem Solve Secure application development Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Get started on a vulnerability risk assessment process to prevent hacks on data, applications and more. Take these steps to identify vulnerabilities and improve risk management. Continue Reading
Middleware tools can present a huge vulnerability, enough to offset their benefits. However, with some simple steps you can protect yourself and your data. Continue Reading