Jack Humphries·Mar 24, 2022Automating Brand Abuse Detection and TakedownsIntroduction ASOS is an ever-growing platform with over 26 million active customers worldwide and a portfolio of nearly 900 global and local partner brands. With this, comes a necessity to protect our customers and our business from those looking to imitate brands and create fake shopping sites, phishing and/or impersonating domains. …Cybersecurity5 min readCybersecurity5 min read
George Mudie·Feb 13, 2020Cyber Security @ ASOS.comThe old days of plugging in a misconfigured firewall and relying on a couple of specialists to save the day are long gone. Now you need a team that proactively assesses security risk and can work with the whole organisation to address these issues. Cyber Security @ ASOS is a…Cybersecurity3 min readCybersecurity3 min read
Stuart Gregg·Feb 11, 2020Security Operations 24x7Cyber Security Operations (SecOps) is going through an exciting period of transformation here at ASOS. SecOps is responsible for the complete monitoring, protection, and investigation of ASOS’s digital and technology solutions against the rapidly evolving ever changing global security threat. We’re expanding our Cyber Security capability to ensure the continued…Cybersecurity3 min readCybersecurity3 min read
Yaniv Menasherov·Feb 11, 2020The skills we look for in Cyber Security Incident ResponseWe see many headlines about the evolving cyber security threat that affects all types of companies. At ASOS we have a Cyber Security team that works across the whole of ASOS to help protect our customers, our employees and our brand. …Incident Response4 min readIncident Response4 min read
Harjit Sandhu·Jul 10, 2019Member-onlyAutomated security testing using language you already knowWhen it comes to the conversation of security, there are many tools that can help us to aim for an optimum level of security. In short, threat modelling is the process of defining the risks in any given system, and then assigning controls given the best result in risk reduction…Security4 min readSecurity4 min read
Harjit Sandhu·Feb 11, 2019Learn how to threat model using an interactive board gameThreat modelling is a very hot topic within security. With many companies struggling to roll out this methodology, we needed a solution that would allow us to do this at scale — Threat modelling allows us to look at any given application and the infrastructure it lives in, as well as document and prioritise the security flaws. For more detail check out the following OWASP entry: https://www.owasp.org/index.php/Application_Threat_Modeling.Security7 min readSecurity7 min read
Dylan Morley·Nov 9, 2018Testing authorisation scenarios in ASP.NET Core Web APIsA common strategy for API authentication and authorisation is to use JWT bearer tokens on the headers of requests. The APIs being designed will often have logic that depends on the claims in the payload of the JWT for making authorisation decisions. …API6 min readAPI6 min read