May 7, 2015
shutterstock_14682724

Simplified Security Code Review Process

Obviously it is not 2005 anymore. 10 years ago most organizations were OK with perimeter security and a vulnerability scanner. This shift started to happen in the U.S […]
April 30, 2015
stock-photo-future-technology-blue-touchscreen-interface-government-screen-concept-188324945

Cyber Security Laws & Regulations in Canada

Pop quiz, do Canadians and Americans approach cyber security the same way? The answer is a clear and definite no. With the recent passage of HB […]
April 8, 2015
express-js

Secure Your Express Application

At Software Secured, we have been building our internal tools around Node.js and Express. Node.js is becoming more and more popular nowadays and several frameworks have […]
November 4, 2013
windows

Top Risks and Recommendations For Windows Store Apps

This article originally appeared on Microsoft Developer Connection   OWASP’s Mobile Top 10 is a project launched by OWASP to identify the top 10 risks and […]
July 16, 2013
fed-id-wordle

Federated Identities: OpenID vs SAML vs OAuth

Single sign-on (SSO) started it all. Organizations needed a way to unify authentication systems in the enterprise for easier management and better security. Single sign-on was […]
April 4, 2013
4zeimmsdyc58esq34wbi

ASP.NET Security Code Review Techniques: SQL Injection Edition

This article appeared originally on Microsoft Canadian Developer Connection   What is SQL Injection SQL Injection is a programming weakness where the application dynamically constructs sql […]