Sophie McKayinTraceable and TrueThe Who, the What, and the Why of OWASPIn your perusal of the web application security and vulnerability space, you might have come across an organisation called OWASP. Who is…Jul 18, 2023Jul 18, 2023
Sophie McKayinTraceable and TrueSo you have an API vulnerability. What does that mean and what can be done?Let’s begin with a little introduction to APIs, their use within the current climate, and the dangers of an insecure API.Jul 18, 2023Jul 18, 2023
Sophie McKayinTraceable and TrueWhy APIs & What Are They Made Of?We’ve covered how prevalent APIs are on the internet and how important they are in the application development process. But why APIs? What…Mar 30, 2023Mar 30, 2023
Sophie McKayinTraceable and TrueProtect Your Data: A Guide to Secure Transmissions for DevsBasically, the internet is a network of connected computers transmitting data from one another. So, if you’re building an application for…Mar 27, 2023Mar 27, 2023
Sophie McKayinTraceable and TrueT-Mobile is in hot water again. Another breach, this time due to insecure API.Within the last week, it has been reported that T-Mobile has had another data breach. On January 5th, T-Mobile detected a threat actor…Jan 27, 2023Jan 27, 2023
Sophie McKayinTraceable and TruePII And You: Why AppDevs need to protect it.Less than a week into 2023 and Twitter has already reported a data breach affecting 200 million users. With data breaches rising by 70% in…Jan 26, 2023Jan 26, 2023