Skip to main content

Application Security Articles

  • Salesforce Says, "Yes," To MFA

    Aaron Bailey - Jan. 11, 2022

    "You know how we tell the good guys from the bad guys? The bad guys shoot at us." Rick Yancey learned this from his father, a concept that can be applied to the cyber world. The "bad guys" are fi… Read More

  • The Passwordless Future

    Micah Snabl - Nov. 09, 2021

    For a long time in the world of computers, "security" has nigh been synonymous with "passwords". "Make complex passwords." "Don't share your passwords." "A member of our staff will never ask you … Read More

  • Open Source in Application Development: Safe or Total Thermal Nuclear War?

    Mike Johnson - Oct. 19, 2021

    Are open-source software tools safe to use in application development? Probably...Sometimes...It Depends. Truthfully, it is challenging for a general consumer to know if a developer has knowingly… Read More

  • Don't Trust Users: Application Security Basics

    Micah Snabl - May. 11, 2021

    When it comes to application security, it pays to be a cynic. When developing a tool, it is quite easy to focus on all of the things it is supposed to accomplish. The converse is of similar impor… Read More

  • A Letter to Cybersecurity from an Application Developer

    Mike Johnson - Apr. 20, 2021

    Dear Cybersecurity, I don't get you. I thought we were going to be good friends instead, you hang out with all my other friends. You've changed, I don't recognize you anymore. I know we haven't a… Read More

Sign up for the monthly newsletter

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at tap@purdue.edu.