Cgisecurity - cgisecurity.com

General Information:

Latest News:

WASC Announcement: Static Analysis Technologies Evaluation Criteria Published 10 May 2013 | 09:27 pm

The Web Application Security Consortium (WASC) is pleased to announce the Static Analysis Technologies Evaluation Criteria. The goal of the SATEC project is to create a vendor-neutral set of criteria ...

WASC Announcement: Static Analysis Technologies Evaluation Criteria Published 10 May 2013 | 09:27 pm

The Web Application Security Consortium (WASC) is pleased to announce the Static Analysis Technologies Evaluation Criteria. The goal of the SATEC project is to create a vendor-neutral set of criteria ...

Poll: How do you rank the importance of a vulnerability? 10 Jan 2013 | 04:37 am

I've added a new poll to the WASC linkedin group that a few of you may be interested in. Specifically asking how people rank the importance of vulnerabilities. Poll Link http://www.linkedin.com/groups...

Poll: How do you rank the importance of a vulnerability? 10 Jan 2013 | 04:37 am

I've added a new poll to the WASC linkedin group that a few of you may be interested in. Specifically asking how people rank the importance of vulnerabilities. Poll Link http://www.linkedin.com/groups...

Five pieces of advice for those new to the infosec industry 31 Oct 2012 | 10:24 pm

I've worked in the security field in various roles (script kiddie, security researcher, incident response, application security engineer, security consultant, strategy, etc..) and thought I'd share a ...

Five pieces of advice for those new to the infosec industry 31 Oct 2012 | 10:24 pm

I've worked in the security field in various roles (script kiddie, security researcher, incident response, application security engineer, security consultant, strategy, etc..) and thought I'd share a ...

Security Industry Plagiarism: Finding 3 examples in 5 minutes with Google 8 Jan 2012 | 09:11 pm

I was taught in grade school that if you plan on writing something, never plagiarize. If you want to republish portions of existing content ensure you properly quote/reference them, and never represen...

Security Industry Plagiarism: Finding 3 examples in 5 minutes with Google 8 Jan 2012 | 04:11 pm

I was taught in grade school that if you plan on writing something, never plagiarize. If you want to republish portions of existing content ensure you properly quote/reference them, and never represen...

Quick defcon/blackhat preparation list 29 Jul 2011 | 08:25 am

A couple of people had asked me what are some things that you can do prior to attending hacker cons such as Blackhat and Defcon. Kurt Cobain said it best "Just because you're paranoid, doesn't mean th...

Quick defcon/blackhat preparation list 29 Jul 2011 | 04:25 am

A couple of people had asked me what are some things that you can do prior to attending hacker cons such as Blackhat and Defcon. Kurt Cobain said it best "Just because you're paranoid, doesn't mean th...

Related Keywords:

XSS, Cross site scripting, http trace, cross-site scripting, apache benchmark, CSRF, false positive, languge on secure websites, xss attempt, site:zsites.com

Recently parsed news:

Recent searches: