You can’t change what you tolerate

Attending a recent meeting I heard one of the speakers say “You can’t change what you tolerate.” Apparently it’s a quote from Cesar Millan (the dog whisperer) but it really struck a chord in me regarding web application security and overall information risk management. How…

Read more

How to Avoid the Google Blacklist

In the ‘old days’ – around 4 to 6 years ago, when the Google Blacklist was less of a news item – hackers were primarily interested in stealing customer data from websites. They would cause absolute havoc after breaking in, stealing anything from customer credit card…

Read more

General Facts and Figures on Web Hacking

Facts about Web Hacking Verizon Business conducted a 2009 study of 90 Web data breaches. The results of this study were presented in The Data Breach Investigative Report (DBIR) and included the following facts and figures: 285 million data records were exposed in the 90…

Read more

Cross-site Scripting

One of the most common forms of Web application vulnerability is Cross-site Scripting.  This security vulnerability allows attackers to implant malicious scripts into websites.  The scripts will execute in the browsers of visitors to the site, within the hosting website security zone.  This provides the…

Read more