Browse by Date
August 16, 2017

Introduction to SQL Mitigation

What is SQL Injection? Originally written for Software Secured. The popularity of Structured Query Language (SQL) injection attacks has grown significantly over the years and employing relevant mitigation practices will help your application from being added to a growing list of insecure applications implicated in significant data breaches. Despite its release nearly 30 years ago, SQL injection has been responsible for millions of lost records with damages also in the millions, earning itself the #1 ...continue

The Internet and Democratic Discourse, Lincoln Dahlberg, 2001.

In his article, The Internet and Democratic Discourse: Exploring The Prospects of Online Deliberative Forums Extending the Public Sphere, Lincoln Dahlberg explores through a case study how a deliberative model of democracy can overcome economic, structural, and social challenges in order to extend the public sphere using a criteria established by Jurgen Habermas....continue

Data Philanthropy and Individual Rights. Mariarosario Taddeo, 2017.

Taddeo, Mariarosaria. 2017. “Data Philanthropy and Individual Rights.” Minds and Machines 27(1):1–5.


In her article Data Philanthropy and Individual Rights, Mariarosario Taddeo argues that data philanthropy could contribute to morally positive social outcomes if operational challenges are overcome....continue

The Internet, Democracy, and the Public Sphere’s Evolution

A free and neutral internet is now a necessary precondition for democracy. To recognize and appreciate the responsibility we’ve entrusted to a continuously evolving global network we look closely at how has fused with with our social, economic, and political institutions. Jürgen Habermas concept of the public sphere gives us the opportunity to untangle why a free and neutral internet is essential component of guaranteeing civil rights, liberties, and a successful democracy. Although the term ...continue

Choosing a Vulnerability Scanner

Originally written for Software Secured. Vulnerability scanning aims to reveal security weaknesses in an application by using automated tools to assess its code, design, and functionality. Design flaws which lead to vulnerabilities like Cross Site Scripting (XSS), SQL Injection, path disclosure, and other vulnerabilities found in the OWASP Top 10. The Vulnerability Landscape Understanding what vulnerabilities exist and identifying those relevant to your application will be the first step in implementing vulnerability scanning practices. The ...continue

Application Security Code Review Introduction

Originally written for Software Secured. Security code review is a process which systematically applies a collection of security audit methodologies capable of ensuring that both environments and coding practices contribute to the development of an application resilient to operational and environmental threats. In practice, code reviews can take on numerous forms including lightweight code discussions or more involved processes such as pair programming, over the shoulder programming, and tool assisted practices. More advanced methodologies involve ...continue

* Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.