Application Security

List of Threat Modeling Tools

Threat modeling tools are used to perform systematic analysis of attack vectors by helping you analyze some of the following…

11 years ago

My All-Time Web Application Security Favorites

Following are my all time favorites web pages I frequently visit for remaining up-to-date with web application security: https://www.owasp.org/ Website…

11 years ago

Obamacare Website HealthCare.gov & Security Threats Review

Well, there have been lot of discussions around security issues with Obamacare website, healthcare.gov which has become talk of the…

11 years ago

Auditing Requirements are Tricky. Isn’t it?

[adsenseyu2] Many a project I worked upon, did not have a clear stated set of requirements related to auditing. Interestingly,…

11 years ago

Developers lack Application Security Skills. Do You Agree?

[adsenseyu2] In my experience, I have found that almost 95% of application developers lack application security skills and at times,…

11 years ago

PHP Code for Avoiding XSS Attacks

[adsenseyu2] Before we go and discuss the PHP coding tips and techniques to avoid Cross-site scripting (XSS) attacks, lets try…

11 years ago

How to Address Application Security in Agile Scrum Teams?

One of the concerns that takes the back burner while setting up the agile SCRUM teams is application security. One…

11 years ago

Top 6 things to Avoid Logging

Following are some of the things you may not want to write in the log file or write in masked…

11 years ago

Minimum Security Coding to do Before Your Website Launch

I am sure you are very excited to launch your website as soon as the coding for minimum functionality is…

11 years ago

Security Code Review Tips for Application Developers

One of the key aspects of secured application development practice is Security code review. Security code review, as like normal…

11 years ago