The article represents some of the examples of OWASP security misconfiguration vulnerabilities that I could figure out by spending sometime…
Off-late I have been doing an extensive research on application security to to come up with application security guidelines (minimum…
If you have been looking out to explore (as depicted by diagram below:-) various different application security forums to keep…
We all come across good security practices and make ourselves familiar with them to develop secured code. However, it may…
This is a series of articles to represent developer's point of view and learning from recent TARGET retail store security…
If you are planning to publish partner APIs for exposing your business services or data to your partners and customers,…
[adsenseyu2] One of the OWASP top 10 application security vulnerability is Security Misconfiguration. One of the most common way to…
Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…
Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…
[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…