Select Page

Security

noun | se·cu·ri·ty | \ si-ˈkyu̇r-ə-tē , -‘kyər- \
a : something that secures : PROTECTION
b (1) : measures taken to guard against espionage or sabotage, crime, attack, or escape
b (2) : an organization or department whose task is security.

Architecture

noun | ar·chi·tec·ture  \ ˈär-kə-ˌtek-chər \
a: the art or science of building; specifically the art or practice of designing and building structures
b: a method or style of building
c: the manner in which the components of a computer or computer system are organized and integrated

Software

noun | soft·ware  \ ˈsȯft-ˌwer \
a: something used or associated with and usually contrasted with hardware : such as programs for a computer
b: the entire set of programs, procedures, and related documentation associated with a mechanical or electronic system and especially a computer system

What You Are Going To Find

I hope you can find clear answers about software security on the posts of this site.
I know firsthand how frustrating it can be when you are under pressure trying to implement flexible and trustworthy security solutions.
Many software security blogs assume you are a seasoned software engineer, with deep knowledge about a wide variety of concepts and technologies. It is taken for granted you are familiar with TCP/IP details, encryption, security threats, and security standards.
The objective of this site is to provide clear information about software security, explaining concepts as you go, and pointing out to useful resources if you need deeper insight.
Please let me know when this objective is not fulfilled. I, and all the other readers, thank you for that.
“Security is, I would say, our top priority because for all the exciting things you will be able to do with computers – organizing your lives, staying in touch with people, being creative – if we don’t solve these security problems, then people will hold back.”

Bill Gates

“Companies spend millions of dollars on firewalls, encryption, and secure access devices and it’s money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.”

Kevin Mitnick

“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”

Bruce Schneier

“The diverse threats we face are increasingly cyber-based. Much of America’s most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.”

James Comey

Sign Up and Receive my Newsletter!

When you sign up you will receive a bi-weekly newsletter email containing headlines and links for the latest software security news and posts from this website.