Threat modeling tools are used to perform systematic analysis of attack vectors by helping you analyze some of the following…
Following are my all time favorites web pages I frequently visit for remaining up-to-date with web application security: https://www.owasp.org/ Website…
Well, there have been lot of discussions around security issues with Obamacare website, healthcare.gov which has become talk of the…
[adsenseyu2] Many a project I worked upon, did not have a clear stated set of requirements related to auditing. Interestingly,…
[adsenseyu2] In my experience, I have found that almost 95% of application developers lack application security skills and at times,…
[adsenseyu2] Before we go and discuss the PHP coding tips and techniques to avoid Cross-site scripting (XSS) attacks, lets try…
One of the concerns that takes the back burner while setting up the agile SCRUM teams is application security. One…
Following are some of the things you may not want to write in the log file or write in masked…
I am sure you are very excited to launch your website as soon as the coding for minimum functionality is…
One of the key aspects of secured application development practice is Security code review. Security code review, as like normal…