Minded Security delivers awareness for the IT and Information Security managers because we believe that knowledge is essential to start or maintain an efficient application security program.
The aim of this section is to provide to our customers awareness about the world of application security and about the Minded Security approach to meet their security concerns.
Secure Code Review: The Minded Security Approach
The document describes in depth the approach of Minded Security with Secure Code Review, what are the advantages and quality of the approach of Minded Security.
In virtue of our research, Minded Security developed the first original Flash Security application testing methodology directed toward the analysis of swf bytecode and reverse engineering skills. Also, SWFIntruder complements the manual activity by using semi-automated runtime analysis in order to refine and accomplish attack scenarios.This paper describes the Minded Security approach to Flash Testing.
Web Application Penetration Test versus Secure Code Review: which is the best approach?
This document is intended to focus on what is the difference between activity and a Web Application Penetration Testing Secure Code Review. In such situations it is preferable to use one or the other approach. Why you should perform both activities and what are the advantages of this approach.
Software Assurance Maturity Assessment
This paper explores the modern practices of Software Assurance and which results can be achieved in conducting this type of activity for the development of the software life cycle.
Minded Security Consulting Services
A study on professional services provided by Minded Security for Application Security.
Why choose Minded Security for the Application Security
What are the distinctive features and why choose Minded Security to start an Application Security Program in your Company.
Application Security Training Courses
Presentation of training courses offered by Minded Security for managers, developers, architects, auditors involved in the life cycle of the software development.
The application security for business users
A course focused on the end users needs for the Application Security. From how to protect at the best the user workstation to how interact in the right manner with the web applications avoiding possible exploitation of the software used from a potential attacker.