Hacking has been going on for decades, so it is unsurprising that with a society as technological as ours, more and more companies and private people are experiencing attacks. Hacking is the primary way in which attackers try to gain access and...
There are three phases of defending against cyber attacks: putting in place sufficient protections and robust authentication mechanisms to try and prevent attacks; appropriately defending against an active attack once it is discovered, and communicating accur...
Developers all over the world have become keen on adopting a high level of application security, especially with the steady rise of cybersecurity threats. The shorter app development app cycle also means that you’ll need a robust security system to flash out ...
Chief information security officers (CISOs) set the tone for establishing a security-conscious business environment. They are responsible for ensuring that the security professionals under them stay aware of the most common vulnerabilities hackers try to expl...
The CWE/SANS Top 25 is a list of the most dangerous common software errors that can leave your application vulnerable to bad actors. It’s put together by MITRE and the SANS Institute as part of the Common Weakness Enumeration (CWE) project. The list can help ...
Once every few years, OWASP releases a Top 10 list, featuring the ten most significant security risks related to developing web applications. OWASP makes this information available to developers around the world, so they can design and deploy safer technologi...
C# OWASP Top 10: How to Discover Vulnerabilities in a C# Web Application In this article, you’ll learn the top 10 security issues in web applications, as defined by the Open Web Application Security Project (OWASP Top 10 – 2017). For each issue, you...
Many applications provide a services layer (to other applications, to a presentation layer, etc.). Or, they consume services exposed by third-parties (not necessarily trusted). A REST model is a simple, widely-used way for designing such service layers. This ...
Legacy “business-oriented” languages present unique challenges for software security. Unfortunately, there is a lack of awareness about the security risks of these languages. In this post, we will focus on the security vulnerabilities inherent in busin...
As the cybersecurity landscape becomes increasingly complex, it’s essential for organizations to stay informed about the tactics most likely to be used against them. In 2023, SQL injection attacks accounted for 23% of all critical web application vulner...
Not Just a Trend The efficiency of DevOps has proven the staying power of integrating development and deployment departments. It’s now more than just a trendy way of restructuring your workflow; it’s a precedent to which your clients are holding you. If you’r...
Pentesting is also called penetration testing or ethical hacking. A penetration test is designed to answer the question: “How effective is my current security against a skilled human attacker?” In this article, we’ll go over what it is, why it’s important to ...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.