Application Security

Top 4 Security Books Developers Would Want to Keep Handy

Off-late I have been doing an extensive research on application security to to come up with application security guidelines (minimum…

10 years ago

List of Application Security Forums/Groups You Would Want to Frequently Visit

If you have been looking out to explore (as depicted by diagram below:-) various different application security forums to keep…

10 years ago

Top 5 Bad Application Security Practices

We all come across good security practices and make ourselves familiar with them to develop secured code. However, it may…

10 years ago

Developer Analysis of Hacker’s Attack on Target Stores – Page 1

This is a series of articles to represent developer's point of view and learning from recent TARGET retail store security…

10 years ago

Top 7 Secured Practices for Securing Your Partner APIs

If you are planning to publish partner APIs for exposing your business services or data to your partners and customers,…

10 years ago

OWASP Security Misconfiguration – Classic Example – 1

[adsenseyu2] One of the OWASP top 10 application security vulnerability is Security Misconfiguration. One of the most common way to…

10 years ago

Tips for Gathering Security Requirements of your Web Application Project

Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…

10 years ago

Top 7 Security Attack Questions While Analyzing Every Requirement

Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…

10 years ago

Tips for Designing Security for Your Public APIs

[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…

10 years ago

List of Threat Modeling Tools

Threat modeling tools are used to perform systematic analysis of attack vectors by helping you analyze some of the following…

10 years ago