Application security April 10, 2018 Penny Hoelscher 2017 OWASP A10 update: Insufficient logging & monitoring Many critics of the Open Web Application Security Project (OWASP) Top Ten list view insufficient logging and monitoring, new on the list in 2017, as more of...
Application security April 9, 2018 Claudio Dodt 2017 OWASP A9 Update: Using Components With Known Vulnerabilities It does not take a rocket scientist to understand using components with known vulnerabilities is a very poor choice. While solving this issue may sound straightforward,...
Application security April 6, 2018 Stephen Moramarco 2017 OWASP A6 Update: Security Misconfiguration The Open Web Application Security Project (OWASP) is a volunteer group whose goal is to build a more robust Internet. One of their flagship publications is...
Application security April 4, 2018 Tyra Appleby 2017 OWASP A4 Update: XML External Entities (XXE) Extensible Markup Language External Entities (XXE) is currently ranked fourth on OWASP’s 2017 Top Ten list of application security risks. Extensible Markup...
Application security April 3, 2018 Tyra Appleby 2017 OWASP A1 Update: Injection Injection is a type of security flaw that has topped the OWASP Top Ten since around 2010. This means it is not a new vulnerability, and despite information...
Application security April 2, 2018 Yassine Aboukir OWASP top 10 application security risks: 2013 vs 2017 The Open Web Application Security Project (OWASP) is a global, nonprofit organization aiming to improve the security of applications and raise awareness of...
Application security March 30, 2018 Lester Obbayi Introduction to OWASP ZAP for web application security assessments The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular web application security testing tools. It is made available for free as an open source...
Application security March 30, 2018 Security Ninja Windows Subsystem for Linux Microsoft has started developing cross-platform integrations into Windows 10. The Windows Subsystem for Linux (WSL) is an example of one these integrations...
Application security March 30, 2018 Graeme Messina How to identify and mitigate XXE vulnerabilities Security vulnerabilities that are created through the serialization of sensitive data are well known, yet some developers are still falling into this trap....
Application security March 30, 2018 Graeme Messina Avoid Disaster with Monitoring and Logging If you have ever been at the epicenter of a security breach relating to online web apps and services, you know just how important your system logs can be as...