[adsenseyu2] Didn't really mean that (R.I.P) way, Indeed. :-) The objective behind this series of blogs is to represent some…
[adsenseyu2] One of the OWASP top 10 application security vulnerability is Security Misconfiguration. One of the most common way to…
Well, I would surely not recommend you to go over the application code and look for things like classes, interfaces,…
Hmm.. was the title intriguing enough for you to check out if you as a developer got any debts to…
Does the above picture include one of the programming languages you are planning to learn or have started learning? I…
Here is an interview with Ajitesh Shukla who has been very passionate about coding all these years and have helped…
We are starting on a new initiative to share the pick of software geeks' brains. The objective is to share…
Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…
Earlier this week, Enterprise software toolmaker Atlassian announced tighter integration between its JIRA issue tracking application and its Confluence team collaboration platform. With this…
Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…
[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…
Following are some of the videos I could gather which presents talks on API design & development. How to Design…
[adsenseyu2] Before I start on this blog, lets take a look at the quote, "Being complex is easy, being simple…
[adsenseyu2] Following are characteristics of a great API: Building Blocks: APIs consisting of one or more methods should act like…
Threat modeling tools are used to perform systematic analysis of attack vectors by helping you analyze some of the following…
[adsenseyu2] Not sure if you are aware or not, but the world is waking up to keywords such as API-First,…