PinnedSoftware SecuredThe New OWASP Top 10 & What It Means to YouA Brief History on OWASP Top 10:Sep 24, 2021Sep 24, 2021
Software SecuredSecurity Theater: When is a “Critical” Really a Critical?What is Security Theater?Sep 30, 2021Sep 30, 2021
Software SecuredSTRIDE Threat Modeling: What You Need to KnowThreat modeling is the ultimate shift left approach. It can be used to identify and eliminate potential vulnerabilities before a single…Sep 28, 2021Sep 28, 2021
Software SecuredProgramming & Code Deployment Practices That Benefit Application SecurityExtreme programming (XP) is an agile software development framework that aims to produce higher quality software and higher quality of life…Sep 24, 2021Sep 24, 2021