Welcome!

Cloud Security Authors: Pat Romanski, Liz McMillan, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

Video: SPI Dynamics Announces the Addison-Wesley Professional Digital Short Cut Secure ASP.NET AJAX Development Written by Jason Schmitt, the Company's Group Product Manager and AJAX Development Expert

Highlights Coding Best Practices and Security Challenges to Demystify Secure AJAX Development

ATLANTA, March 19 /PRNewswire/ -- S.P.I. Dynamics, Inc. (http://www.spidynamics.com/), the leading provider of web application security testing software and services, today announced the new release of the digital Short Cut titled, Secure ASP.NET AJAX Development authored by the company's Group Product Manager, Jason Schmitt, who oversees strategy for SPI Dynamics' developer and quality assurance security testing solutions. The digital Short Cut PDF published by Addison-Wesley Professional, an imprint of Pearson Technology Group, highlights the security challenges of AJAX web applications and best practices for secure web application development with AJAX technologies. Short Cuts are concise PDF documents about a cutting-edge technology that shows great promise, or an existing technology that has reached the "tipping point" and is about to take off.

To view the Multimedia News Release, go to: http://www.prnewswire.com/mnr/spidynamics/27418/

SPI Dynamics has maintained aggressive research on AJAX for several years to ensure the entire SPI Dynamics' product line addresses the security of this rapidly growing technology. The release of Secure ASP.NET AJAX Development is another example of the company's abundant expertise in the area of AJAX security and cutting-edge technologies that define the future of web applications and Web 2.0. Microsoft's ASP.NET AJAX technologies, commonly known by the codename "Atlas," and other AJAX frameworks are changing the way web applications look and are developed, but web developers are often unaware of the security risks they are introducing into their applications with these emerging technologies.

AJAX fundamentally changes the user experience and server interaction in web applications, so developers may be taking otherwise secure applications and opening up new angles of attack for hackers. Secure ASP.NET AJAX Development outlines the increased security risk inherent with AJAX technologies and addresses how developers can use Microsoft's ASP.NET AJAX to implement secure AJAX applications. The Short Cut discusses web application security pitfalls that are common in AJAX development, given its focus on increased client processing and more frequent access to web services and databases. In addition, the digital Short Cut focuses on a few key security principles for AJAX developers-demystifying AJAX security and teaching how to develop secure AJAX applications using ASP.NET AJAX Extensions. The Short Cut concludes with a walkthrough of security testing best practices that will help effectively uncover security problems in AJAX applications during development and testing.

About the Author

Jason Schmitt is Group Product Manager for SPI Dynamics where he is responsible for overseeing product strategy and direction for the company's developer and QA products, DevInspect(R) and QAInspect(R), that help build and test secure web applications. Jason's expertise extends from product management and product development to technical consulting. His background includes senior management at EzGov in product engineering where he managed product development teams in the design, implementation and delivery of web application framework and development products for e-government, as well as consulting management where he managed projects and programs of web application development for federal, state and international governments. Prior to EzGov, Jason was a technical consultant for Ariba, and a consultant for telecom companies for Anderson Consulting. Jason often contributes articles to industry publications on secure software development. Jason holds a Bachelor of Mechanical Engineering from the Georgia Institute of Technology and a Masters of Business Administration from Georgia State University.

For more information on Secure ASP.NET AJAX Development, please visit http://www.informit.com/bookstore/product.asp?isbn=0321498100&rl=1. For more information on SPI Dynamics and securing web applications throughout the development process, please visit http://www.spidynamics.com/.

For more information on AJAX security threats and their impact, the following materials from SPI Dynamics are available:

-- White paper - "AJAX Security Dangers" http://www.spidynamics.com/assets/documents/AJAXdangers.pdf -- On Demand Webcast - "AJAX (in)security" https://download.spidynamics.com/registration/AJAX_webcast.asp About Short Cuts

Short Cuts are concise PDF documents designed specifically for busy technical professionals, published by the imprints of Pearson Technology Group. Short Cuts are tightly focused on a specific technology or technical problem. This may be a cutting-edge new technology that shows great promise, or it may be an existing technology that has reached the "tipping point" and is about to take off. Either way, written by industry experts and best selling authors, Short Cuts are the short cut to technical mastery. Short Cuts Digital PDFsNEW

About S.P.I. Dynamics, Inc.

SPI Dynamics' comprehensive suite of products and services identify and remediate web application and web services security vulnerabilities throughout the application development lifecycle. These award-winning solutions also enable security professionals, QA testers, and developers to work together to verify compliance with over 22 security policies such as SOX, HIPAA and PCI. SPI Dynamics has the most application security testing customers worldwide - over 950 clients among Global 2000 enterprises, including four out of five of the world's largest banks and nine out of ten of the largest banks in the U.S., four out of five of the largest software companies, three out of four of the largest aerospace and defense companies, the four largest accounting firms, the five largest telecommunications companies in the U.S., six out of eight of the largest technology hardware and equipment companies, two out of three of the largest healthcare companies, and over ninety U.S. Federal agencies. The Company is one of the fastest growing in the security industry, ranked 83rd on Deloitte and Touche's "Fast 500" list of growing technology companies nationwide and 220th on the Inc. 500. SPI Dynamics has strategic partnerships with Microsoft, IBM, HP and Visa. The Company's R&D team, SPI Labs, is widely recognized as a world leading authority on web application security and risk management. For more information, visit http://www.spidynamics.com/ or call (866) 774-2700.

DevInspect and QAInspect are registered trademarks of S.P.I. Dynamics, Inc. Product or service names mentioned herein are the trademarks of their respective owners.

S.P.I. Dynamics, Inc.

CONTACT: Ashley Vandiver of SPI Dynamics, +1-678-781-4841, Mobile,
+1-404-432-8657, [email protected]; or Michelle Schafer of Merritt
Group, +1-703-390-1525, Mobile, +1-703-403-6377, [email protected], for
SPI Dynamics

Web site: http://www.spidynamics.com/
http://www.spidynamics.com/assets/documents/AJAXdangers.pdf
https://download.spidynamics.com/registration/AJAX_webcast.asp
http://www.informit.com/bookstore/product.asp?isbn=0321498100&rl=1

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
When Enterprises started adopting Hadoop-based Big Data environments over the last ten years, they were mainly on-premise deployments. Organizations would spin up and manage large Hadoop clusters, where they would funnel exabytes or petabytes of unstructured data.However, over the last few years the economics of maintaining this enormous infrastructure compared with the elastic scalability of viable cloud options has changed this equation. The growth of cloud storage, cloud-managed big data e...
Your applications have evolved, your computing needs are changing, and your servers have become more and more dense. But your data center hasn't changed so you can't get the benefits of cheaper, better, smaller, faster... until now. Colovore is Silicon Valley's premier provider of high-density colocation solutions that are a perfect fit for companies operating modern, high-performance hardware. No other Bay Area colo provider can match our density, operating efficiency, and ease of scalability.