Web application and mobile app security

You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted.

Articles
Webcasts
  • Five Considerations for the Other SaaS – Security as a Service
  • Ensuring PCI DSS Compliance in the Cloud
  • Common security-related oversights, assumptions, and blunders in software testing Security comprises a significant portion of the overall quality of software yet we continue to see software flaws that create unnecessary business risks and lead to application-level data breaches. In this webast, I explore the causes of gaps in the software testing process and offers suggestions on how to fix them.
  • Focusing on what’s important with your Web application security scanning and testing Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this webcast, I share what you need to know in order to find Web security vulnerabilities in your environment.
  • Essential Elements of Web Application Penetration Testing In this webcast I show you how to maximize the value of your penetration testing efforts and the security of your Web applications. Just the essentials of what you need to know.
Podcasts
  • Web scanning security testing
    What should be the first step in Web application security testing? What is the difference between penetration testing, ethical hacking, vulnerabililty scanning and source code analysis? I answer these questions and others in this podcast in which I explain how your organization can focus what’s important in security testing.
  • Podcast: Security testing blunders In this podcast, I talk about the importance of security testing and how to get management buy – in. I describe the most common application security flaws and outline why the biggest oversight when in security testing in inaction. Tune in as I describe a game plan that will help you move your security testing efforts forward.
  • Hacker-Proof Your Applications

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: