Click here to close now.




















Welcome!

@CloudExpo Authors: Liz McMillan, Tom Lounibos, AppDynamics Blog, Pat Romanski, Eric Aarrestad

News Feed Item

Aspect Security Marks eLearning Curriculum Milestone With More Than 100,000 Modules in Use Worldwide

Web-Based Education Series Arms Developers With the Most Current Thinking Around Building Security Into Applications

COLUMBIA, MD -- (Marketwire) -- 12/17/12 -- Aspect Security, a pioneer in application security, today announced that more than 100,000 individual modules of its eLearning curriculum are in use by developers worldwide at many corporate entities, including giants in the financial, shipping and logistics, and airline industries, and large government agencies.

Aspect Security eLearning is a web-based series for developers, managers, testers and security architects that helps companies resist application security breaches by educating those involved in creating applications. Aspect Security's eLearning curriculum features 53 learning modules at three different levels of technical depth.

Each module leverages educational best practices for comprehension and retention. The modules are approximately 20 minutes in length and feature regular quizzes to aid in comprehension and retention. Now, with the addition a module dedicated to mobile application security, Aspect Security's eLearning curriculum offers a complete solution to application security education.

"We are very proud of our eLearning offering, which really stands alone in the industry for its breadth, levels of technical depth and suitability for deployment by even the most distributed global enterprise," said Andi McDowell, VP, Products and Administration, Aspect Security. "We put a great deal of effort into designing a curriculum and a deployment system to meet the needs of a wide range of organizations and raise the bar in the industry for application security education."

"Application security is the single greatest area of vulnerability for enterprise IT right now, and is largely a 'people problem' -- in our experience the single most effective way an organization can address this is to train developers in secure coding," said Jeff Williams, Aspect Security CEO and Co-Founder of the Open Web Application Security Project (OWASP). "In this increasingly connected universe, developers need to be armed with the right knowledge about application security and how to address vulnerabilities so that they can write secure code from the outset."

Angel, global leader in enterprise, cloud-based, Interactive Voice Response (IVR) and call-center customer experience solutions, deployed Aspect's interactive eLearning modules for its secure application development training.

"PCI Level I certification was a huge achievement for us, and thanks to Aspect, the development team was well prepared for the process. With Aspect eLearning we were able to deploy a very cost-effective remote training solution that turned out to be more effective than the instructor-led options we explored," said Ian Macdonald, Senior Systems & Security Architect, Angel.

Download the full case study here https://www.aspectsecurity.com/case-study/

Aspect eLearning Modules
Aspect's eLearning for Secure Application Development includes a comprehensive selection of web based interactive modules. Each module features culturally neutral content that is suitable for use by English-speaking developers around the world. Organizations with Learning Management Systems (LMS) can have the modules delivered directly, or a hosting solution can be provided by Aspect.

The modules are organized into three tiers by level of technical depth:

  • Awareness Series - Includes 11 modules that deliver a general overview of application security suitable for IT executives and managers as well as developers, testers and security architects.
  • Technical Series - Features 35 modules that emphasize more technical topics including the OWASP Top Ten, PCI awareness, how to prevent Cross-Site Scripting, Clickjacking and other attacks, designed for developers, managers, testers, and security architects.
  • Specialist Series - Offers 7 modules on advanced methodologies and application security verification and is geared towards security-focused managers, testers and architects.

Customers may choose to purchase the entire 53 module curriculum or select content a la carte, tailored to meet their specific training needs. Designed for groups rather than individual users, the minimum order is $5,000.

Organizations and developers interested in learning more about Aspect's eLearning for Secure Application Development can download the curriculum, explore a course-mapping guide and view an interactive demo at www.aspectsecurity.com/services/elearning/.

For new customers of the eLearning offering, Aspect Security is offering 15 months for the price of 12, an offer valid through February 1, 2013. For more information, please visit www.aspectsecurity.com/services/elearning/.

About Aspect Security
Founded in 2002, Aspect Security is a consulting firm focused exclusively on application security, ensuring that the software that drives business is protected against hackers. Aspect Security's engineers analyze, test and validate on average of 5,000,000 lines of critical application code every month. The company unearths more than 10,000 vulnerabilities every year across a wide range of technologies and architectures, and the company's practical recommendations dramatically improve clients' security posture.

Aspect Security has taught tens of thousands of people around the world how to build, test and deploy secure applications, making the company a leader in application security training. Flexible delivery options include instructor-led training either in-person or via webcast or on-demand through an innovative eLearning curriculum.

CEO Jeff Williams is a Co-Founder of the Open Web Application Security Project (OWASP), through which he has made vast industry contributions including: the OWASP Top Ten, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Risk Rating Methodology and WebGoat.

For more information, please visit www.aspectsecurity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Chmielewski
Madison Alexander PR
714-832-8716
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Public Cloud IaaS started its life in the developer and startup communities and has grown rapidly to a $20B+ industry, but it still pales in comparison to how much is spent worldwide on IT: $3.6 trillion. In fact, there are 8.6 million data centers worldwide, the reality is many small and medium sized business have server closets and colocation footprints filled with servers and storage gear. While on-premise environment virtualization may have peaked at 75%, the Public Cloud has lagged in adop...
The time is ripe for high speed resilient software defined storage solutions with unlimited scalability. ISS has been working with the leading open source projects and developed a commercial high performance solution that is able to grow forever without performance limitations. In his session at Cloud Expo, Alex Gorbachev, President of Intelligent Systems Services Inc., shared foundation principles of Ceph architecture, as well as the design to deliver this storage to traditional SAN storage co...
MuleSoft has announced the findings of its 2015 Connectivity Benchmark Report on the adoption and business impact of APIs. The findings suggest traditional businesses are quickly evolving into "composable enterprises" built out of hundreds of connected software services, applications and devices. Most are embracing the Internet of Things (IoT) and microservices technologies like Docker. A majority are integrating wearables, like smart watches, and more than half plan to generate revenue with ...
The Cloud industry has moved from being more than just being able to provide infrastructure and management services on the Cloud. Enter a new era of Cloud computing where monetization’s services through the Cloud are an essential piece of strategy to feed your organizations bottom-line, your revenue and Profitability. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed how to easily o...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...