loading...

# applicationsecurity

đź‘‹ Sign in for the ability sort posts by top and latest.
Validating JWTs in Web APIs

Validating JWTs in Web APIs

Reactions 6
2 min read
Application Security Best Practices / Defensive Programming

Application Security Best Practices / Defensive Programming

Reactions 14
12 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

Reactions 11
4 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

Reactions 74 Comments 5
4 min read
The Best Tools for Mobile Application Security Testing

The Best Tools for Mobile Application Security Testing

Reactions 2
3 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

Reactions 12 Comments 1
2 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Reactions 2
1 min read
All about SIEM

All about SIEM

Reactions 3
2 min read
Pushing Left, Like a Boss - Part 9: An AppSec Program

Pushing Left, Like a Boss - Part 9: An AppSec Program

Reactions 13
4 min read
Pushing Left, Like a Boss - Part 8: Testing

Pushing Left, Like a Boss - Part 8: Testing

Reactions 18
2 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Reactions 45
4 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

Reactions 18
4 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Reactions 17
4 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

Reactions 14
6 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Reactions 18 Comments 3
2 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

Reactions 9
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Reactions 11 Comments 1
4 min read
Simple Tool for Testing CVE Mitigation in Web Apps

Simple Tool for Testing CVE Mitigation in Web Apps

Reactions 8 Comments 1
4 min read
Implement Secure data solutions

Implement Secure data solutions

Reactions 5
2 min read
Implementing Authentication with Azure AD

Implementing Authentication with Azure AD

Reactions 7
1 min read
Updating a .netcore Website’s Security Headers

Updating a .netcore Website’s Security Headers

Reactions 4
1 min read
loading...