-3 minWhat is Application Security Testing?SAST, DAST, IAST & RASP..too many acronyms to keep up with? Here is a quick primer that will help you navigate the world of Application
Reshmi Radhakrishnan3 minOWASP Top 10 : Insufficient Logging & MonitoringAccording to the 2020 IBM breach report, the average time to detect and contain a data breach is 280 days. Logs are an important part of inc
-3 minOWASP Top 10 : Using Components with Known VulnerabilitiesUsing components with known vulnerability is one of the easily exploitable Web Application Vulnerability raked 9th in the OWASP Top 10 2017.
Reshmi Radhakrishnan2 minOWASP Top 10 : Insecure DeserializationSerialization is a process of converting objects and its state to a byte stream for ease of communication. Deserialization is recreating tha
-3 minOWASP Top 10 : Cross-Site Scripting(XSS)Cross-Site Scripting(OWASP-A7 2017) is one of the major web application security vulnerability. It is a scripting attack to hijack access.
Reshmi Radhakrishnan2 minOWASP Top 10 : Security MisconfigurationSecurity misconfiguration happens when security settings are not properly set during the configuration process or deployed and maintained wi
-3 minOWASP Top 10 : Broken Access ControlBroken Access Control is one of the most critical Web Application Vulnerability raked 5th in the OWASP Top Ten 2017.
Reshmi Radhakrishnan2 minOWASP Top 10 : XML External Entities (XXE) VulnerabilityXXE is a web security vulnerability that parses XML input from untrusted sources using a weakly configured XML parser.
-2 minOWASP Top 10 : Sensitive Data ExposureSensitive data exposure(OWASP A3:2017) is one of the most dangerous web application vulnerabilities faced by a organization.
Reshmi Radhakrishnan2 minOWASP Top 10 : Broken AuthenticationBroken authentication stems from vulnerabilities in web applications that allow the attackers unauthorized access or bypass authentication,
-3 minOWASP Top 10 : Injection AttacksAn injection attack occurs due to a vulnerability in your application that allows an attacker to inject untrusted input to a program.
Kannan Udayarajan2 minBuild a "Security First" culture in your team through offensive securityCreating a "Security First" culture necessarily involves bringing together all your team members to align on a common vision, a shared persp
Kannan Udayarajan2 min4 ways to prove your application's security in sales conversations"How will your ensure that our data is protected?" This is now a sure shot question in any sales conversations for technology product and...
Siemba2 min3 reasons why you should consider third party penetration testing.Here are some reasons why we think a third party Penetration Test would be beneficial to you.