Security
-
Enterprise Java
Deploying Identity Server over a JDBC Based User Store
With this post I am to demonstrate how to configure WSO2 Identity Server with a JDBC user store. For the…
Read More » -
Software Development
How To Start With Software Security – Part 2
Last time, I wrote about how an organization can get started with software security. Today I will look at how…
Read More » -
Software Development
What is a software quality?
If any of you have heard me speak in a training session or conference you’ll know I am found of…
Read More » -
Agile
Getting Application Security Vulnerabilities Fixed
It’s a lot harder to fix application security vulnerabilities than it should be. In their May 2013 security report, WhiteHat…
Read More » -
Core Java
Safely Create and Store Passwords
Nearly every time when it comes to user profiles it is necessary to manage user credentials and thus be able…
Read More » -
Scala
A practical solution to the BREACH vulnerability
Two weeks ago CERT released an advisory for a new vulnerability called BREACH. In the advisory they say there is…
Read More » -
Core Java
Securing HTTP-based APIs With Signatures
I work at EMC on a platform on top of which SaaS solutions can be built. This platform has a…
Read More » -
Software Development
What is Important in Secure Software Design?
There are many basic architectural and design mistakes that can compromise the security of a system: Missing something important in…
Read More » -
Core Java
Java Security Tutorial – Step by Step guide to create SSL connection and certificates
In our series of articles on applying JEE security we present you another detailed tutorial on how to create a…
Read More »