Application security March 2, 2022 Ted Harrington Can bug bounty programs replace dedicated security testing? Bug bounty programs don’t replace the need for a security consulting company that you work directly with for your security testing program.
Application security February 23, 2022 Ted Harrington The 7 steps of ethical hacking To beat hackers at their own game, you need to think like them.
Application security February 11, 2022 Aaron Saray Laravel authorization best practices and tips Learn best practices for authorization in Laravel, such as only authorizing against permissions, not roles.
Application security February 9, 2022 Patrick McSweeney Learn how to do application security right in your organization Learn the right way to do security from the guy who literally wrote the book on the subject — best-selling author and cybersecurity expert Ted Harrington.
Application security February 9, 2022 Aaron Saray How to use authorization in Laravel: Gates, policies, roles and permissions Learn how to use Laravel in authorization to your application.
Application security February 9, 2022 Ted Harrington Is your company testing security often enough? Security is an ongoing process: you’ll need to regularly reassess your system for vulnerabilities.
Application security February 7, 2022 Aaron Saray Authentication vs. authorization: Which one should you use, and when? Take a look at the difference between authentication and authorization and what works best for you.
Application security February 2, 2022 Ted Harrington Why your company should prioritize security vulnerabilities by severity You want a system in place to grade severity so you know where to focus your efforts, and in what order.
Application security January 26, 2022 Ted Harrington There’s no such thing as “done” with application security Technology evolves so quickly that it requires you to constantly revisit your security to stay ahead of new vulnerabilities.
Application security January 19, 2022 Ted Harrington Understanding hackers: The insider threat Companies often think of attackers as something that comes from the outside, yet overlook the far more dangerous threat: attackers from within.