Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…
Earlier this week, Enterprise software toolmaker Atlassian announced tighter integration between its JIRA issue tracking application and its Confluence team collaboration platform. With this…
Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…
[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…
Following are some of the videos I could gather which presents talks on API design & development. How to Design…
[adsenseyu2] Before I start on this blog, lets take a look at the quote, "Being complex is easy, being simple…
[adsenseyu2] Following are characteristics of a great API: Building Blocks: APIs consisting of one or more methods should act like…
Threat modeling tools are used to perform systematic analysis of attack vectors by helping you analyze some of the following…
[adsenseyu2] Not sure if you are aware or not, but the world is waking up to keywords such as API-First,…
[adsenseyu2] Before going over some of top static code analysis tools for Java, lets quickly look at why do we…