Blog

Avoiding hacker tricks

By Brian Ewoldt | August 29, 2014

hacker-image-300x237

So in a perfect world, your computers, servers, and web pages could not be hacked. In a perfect world, users would not be allowed access to data or your servers. In a perfect world, computers would be stand-alone machines. In a perfect world, I would have a flying car and sharks with laser beams in a moat around my castle. We all know there is no such thing as a perfect world...and the flying car has little over a year to appear, at least according to the "Back to the Future" movies. Because we don't live in a perfect world, we need to have computer security. Computer security is said to be a reactionary endeavor. The IT security people are always reacting to a new threat.

With that being said, there are ways to be proactive. In our most recent live webinar, expert Mike Benkovich covered ways that you can prevent some of the most common attacks. Mike explored a secure development approach and showed some of the top exploits that you need to know about. He demonstrated how you can use .NET features to stop exploits before they happen, and he showed injection attacks, cross-site scripting, and security misconfiguration. We looked at the hacker's psyche and showed how they think and work, and learned what we can do to build more secure software.

With all the stories of data breaches in the last year or so, it is even more important to be sure you are on top of security from initial development of any project. In a perfect world, you would have been able to attend this webinar. In perfect world, there would be a recording of this webinar available to you. Well, the world is not perfect, but in this case we do have the replay of the webinar for your viewing pleasure. The world may be perfect once flying cars appear.  



This blog entry was originally posted August 29, 2014 by Brian Ewoldt