Radical Development

Technical Without the Technicalities

International Airport Cyber Security Challenges


Air travel and the security measures surrounding this industry face countless challenges today than ever before. On September 11, 2001, the world changed forever due to the terrorist attack on the United States and airport security would never be the same again. The need to protect nations and their citizens drove changes both in the airline industry and government responsibilities. The solutions engaged today does a great job of addressing security threats however; the thin line of personal freedom and the regulations enacted by governments is questionable by many citizens and activist groups. In late 2001, the Transportation Security Administration … Continue reading

Free Security Vulnerability Guides From Veracode


Veracode focuses on security for organizations to accurately identify and manage application security risk. They offer a number of resources to include podcast, whitepapers, cheat sheets, and much more. SQL Injection Cheat Sheet The SQL Injection Cheat Sheet provides a summary of everything you need to know about SQL Injection. The SQL Injection Cheat Sheet contains the key concepts of SQL Injection and a SQL Injection example and tips for prevention of SQL Injection attacks. Note that you must register with Veracode in order to obtain these cheat sheets. Download the FREE SQL Injection Cheat Sheet Cross-Site Scripting (XSS) Cheat … Continue reading

Facing Cyber Security Threats From Employees


At the epicenter of any company is its employees and because people come from various backgrounds, it is essential to define educational activities and expectations. Companies who institute security policies and training guidelines supply employees the means to protect the company’s interest. People by nature want to do the right thing; however, employees must understand the rules to succeed. The cause of many security infractions is traced back to poor decisions when it comes to understanding the extent of security risks to include email, mobile devices, social networking, and work expectations. It is important to recognize that hardware and software … Continue reading