Company's top lawyer announces effort towards wide-reaching encryption to protect customer information
Application security, web app security, secure code development and software vulnerabilities
Its time to change your password again in the wake of a hack exposing millions of passwords from Facebook, Google, and Twitter
Organizations selling exploits for vulnerabilities in software from major companies including Microsoft, Apple, Oracle, and Adobe
Big Data creates new security and privacy challenges that de-identification can't meet
Trustwave finds botnet C&C server with compromised account information
InfoSec Institute's Kim Crawley details CryptoLocker, the latest in scareware, and offers suggestions for avoiding infection
One of the principal security engineers at ground zero during the 2011 RSA breach talks IOCs with CSO
With virtualization on the rise in small- to medium-sized business, its security benefits may be a significant contributing factor
Still hungry? Here are links to application security books, associations, and other information resources to help you find (and avoid) vulnerabilities and build secure software and websites.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard (2011). On Amazon.com.
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by Michael Howard (2010). On Amazon.com
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition by Allen Harper (2011). On Amazon.com.
OWASP, the Open Web Application Security Project.
BSIMM, the Building Security In Maturity Model.
Also see Application and software security certifications in CSOonline's Security Certification Directory.