Contact Info

OWASP Proactive Controls OWASP Foundation

Refer to the Cheat Sheets for the several good practices that are needed for secure authorization. There are also third party suppliers of Identity and Access Management (IAM) that will provide this as a service, consider the cost / benefit of using these (often commercial) suppliers. Note that there are various ‘OWASP Top Ten’ projects, […]

Java SE Development Kit 7 Update 21 Release Notes

For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version 7u91) on February 20, 2015. For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version 7u95) on May 19, 2016. For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version […]