May 7, 2015

Simplified Security Code Review Process

Obviously it is not 2005 anymore. 10 years ago most organizations were OK with perimeter security and a vulnerability scanner. This shift started to happen in the U.S […]
April 30, 2015

Cyber Security Laws & Regulations in Canada

Pop quiz, do Canadians and Americans approach cyber security the same way? The answer is a clear and definite no. With the recent passage of HB […]
April 8, 2015

Secure Your Express Application

At Software Secured, we have been building our internal tools around Node.js and Express. Node.js is becoming more and more popular nowadays and several frameworks have […]
November 4, 2013

Top Risks and Recommendations For Windows Store Apps

This article originally appeared on Microsoft Developer Connection   OWASP’s Mobile Top 10 is a project launched by OWASP to identify the top 10 risks and […]
July 16, 2013

Federated Identities: OpenID vs SAML vs OAuth

Single sign-on (SSO) started it all. Organizations needed a way to unify authentication systems in the enterprise for easier management and better security. Single sign-on was […]
April 4, 2013

ASP.NET Security Code Review Techniques: SQL Injection Edition

This article appeared originally on Microsoft Canadian Developer Connection   What is SQL Injection SQL Injection is a programming weakness where the application dynamically constructs sql […]