contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
RSA eases security process for Java developers
Tuesday, 20 July 2004, 15:08 GMT

Tools & Technology RSA eases security process for Java developers By Rich Seeley Java developers would probably rather be coding Web services applications than learning the intricacies of Web services security, surmises Kathy Kriese, senior product manager at RSA Security Inc., Bedford, Mass. But in a classic dilemma, you can't have one without the other. Complicating things further, if a developer doesn't have a core competency in security, they very well may leave holes that a hacker could drive a truck through.

"Security isn't an easy area to do right," Kriese told JDT. "People not familiar with it find it very hard to do."

The result is the constant news of yet another security hole being discovered and possibly exploited in another Web services application.

Read More at ' '

Back to main page


SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Smart-Phone Attacks and Defenses
» Preventing Spyware Infestation
» Preliminary study: Bluetooth Security
» An initiative extending SMTP to include email sender identity and reputation
» Identity Assurance in a Virtual World
Latest Press Releases
» Open Door Networks Announces The Doorstop X Firewall
» Defence Plus 2.0: Unyielding Line of Defence against Hacker Intrusion
» Enterprise Strategy Group Highlights Application Security, Inc. for Uniquely Addressing the Complete Application Security Lifecycle
» Elemental Names Google Executive To Its Board Of Directors, Further Broadens Experience Of Security Compliance Management Provider
» Arbor Networks Launches New Network Security and Management Platform for Service Providers
» 802.11 Wireless Networks: The Definitive Guide, Second Edition
More Articles
» Voice and Data Convergence - a Vendor’s Perspective
» Making Firewall Do the Work: Stateful Packet Inspection
» Four Things You Must Know Before Deploying Wireless LANs
» Put spyware on the security map
» Interview with Brian Carrier, author of “File System Forensic Analysis"
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter