Trusted Application Base Why Target Needs a Secure, Trusted Application Base

Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.

Bob Aiello's picture Bob Aiello
The Bugs That Deceived Me The Bugs That Deceived Me

Every time we look at the data, we perform an analysis that helps us make decisions—hopefully the right ones. In this article, Gil Zilberfeld describes a few traps where bug data misled him to make bad decisions. These traps are in the data itself, not the tools, and can lead us in the wrong direction.

Gil Zilberfeld's picture Gil Zilberfeld

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.