• Sponsor Resources
  • Related Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Enterprise IAM
    • IoT Security

Lesson 1:


Cobb discusses the risks involved in using open source software and how IT security and development teams can work together to ensure best practices for secure development.

Living With
Open Source Software


Lesson 2:


Learn how you can lower your risk by revisiting application security policy and enforcing compliance with best practices.

Update Your Application
Security Policy After Heartbleed

Lesson 3:


Cobb describes ways to track and supervise the ongoing use of open source code to ensure it’s a benefit, not a risk.

Take Inventory Of
Your Open Source
Software Security

Application Security

Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.

TOP

Michael Cobb
Founder and managing director of Cobweb Applications

Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 15 years of experience in the IT industry and another 16 years of experience in finance. He is the founder and managing director of Cobweb Applications Ltd., a consultancy that helps companies to secure their networks and websites, and also helps them achieve ISO 27001 certification. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications.

TOP


Sponsor Resources

IBM is a global technology and innovation company headquartered in Armonk, NY. It is the largest technology and consulting employer in the world, with more than 400,000 employees serving clients in 170 countries. IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected.

Learn More
  • IBM Maintains Leadership Position in 2015 Gartner Magic Quadrant for Application Security Testing

  • Mitigate Business Risk Strategically With Application Security Management

  • IBM-Sponsored Ponemon Institute Study Reveals Alarming State of Mobile Security for Apps

  • Arxan Digital Piracy: Why Is Digital Piracy Running Rampant, and What Can We Do About It?" Evolves

  • Arxan State of AppSec 2016 State of Application Security: Top Health Care Apps in Critical Condition

  • E-Guide: Five Steps for Risk-Based Application Security Management

  • Application Security Risk Mgmt: Manage Application Vulnerabilities Effectively with IBM Application Security Risk Management

  • Ponemon Mobile Insecurity: "INFOGRAPHIC: Mobile Insecurity


TOP

Related Resources

TechTarget networking websites cover routing and switching, network security and management, application performance and delivery, VoIP, unified communications and collaboration, wireless LANs, Software Defined Networking, Wide Area Networks and mobility. SearchNetworking.com


Learn More
  • Application Security Policy After Heartbleed

  • Does Your System Design Eliminate The Top 10 Software Security Flaws?

  • How To Safely Use Open Source Libraries

  • Will The Core Infrastructure Initiative Improve Open Source Safety?


TOP

Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111