Application security March 23, 2022 Ted Harrington How to find the perfect security partner for your company Not all advisors are created equal, so you’ll want to choose carefully and consider a variety of factors.
Application security March 16, 2022 Ted Harrington Security gives your company a competitive advantage When you properly secure your software system and then can prove it, you obtain a competitive advantage that helps you earn trust and win sales.
Application security March 9, 2022 Ted Harrington 3 major flaws of the black-box approach to security testing By understanding the methodology’s three primary flaws, you and your security team can be more effective in protecting your company’s assets.
Application security March 2, 2022 Ted Harrington Can bug bounty programs replace dedicated security testing? Bug bounty programs don’t replace the need for a security consulting company that you work directly with for your security testing program.
Application security February 23, 2022 Ted Harrington The 7 steps of ethical hacking To beat hackers at their own game, you need to think like them.
Application security February 11, 2022 Aaron Saray Laravel authorization best practices and tips Learn best practices for authorization in Laravel, such as only authorizing against permissions, not roles.
Application security February 9, 2022 Patrick McSweeney Learn how to do application security right in your organization Learn the right way to do security from the guy who literally wrote the book on the subject — best-selling author and cybersecurity expert Ted Harrington.
Application security February 9, 2022 Aaron Saray How to use authorization in Laravel: Gates, policies, roles and permissions Learn how to use Laravel in authorization to your application.
Application security February 9, 2022 Ted Harrington Is your company testing security often enough? Security is an ongoing process: you’ll need to regularly reassess your system for vulnerabilities.
Application security February 7, 2022 Aaron Saray Authentication vs. authorization: Which one should you use, and when? Take a look at the difference between authentication and authorization and what works best for you.