Zoekresultaten
  1. 3 minuten geleden

    See how you can blend early on in the dev/testing processes in 's July 16 webinar. Register now:

  2. 47 minuten geleden

    Does your organization make use of components when developing mission-critical code? If so, you NEED to review & share these best practices from . Thank you!

  3. 3 uur geleden

    Securing Serverless Apps: 3 Critical Tasks in 3 Days by

  4. 3 uur geleden

    We've been writing a lot recently, come and read our insights.

  5. 4 uur geleden

    Our GDPR Checklist got mentioned by our friends at . ✅

  6. 10 uur geleden

    Find out why was named a Leader in Gartner's March 2018 Magic Quadrant for Application Testing.

  7. 11 uur geleden

    Doing root cause analysis vs just fixing a bug -getting true security mindset in the culture, a must. The curiosity and drive for quality is usually already there!(+ideally get the PM & Chuck Norris aligned with your goals!)

  8. 12 uur geleden

    Case to management for (ideally) a secure : x5-x10 times cheaper to fix something in an earlier cycle, and can be detrimental if in production - so bring in security early!

  9. 14 uur geleden
  10. 15 uur geleden

    Study finds nearly half of web applications put user at risk, reports | |

  11. 28 jun.

    [F5 Newsroom] Read how the Anti-Bot Mobile SDK extends bot protection to apps:

  12. 28 jun.

    We are excited to welcome Karen Staley the new Executive Director of Foundation in London next week at 2018 Conference! Looking forward to seeing the members of international OWASP community and expert speakers gathering in London July 2th-6th!

  13. 28 jun.

    will be chatting about WAF Bypass Techniques Using HTTP Standard and Web Servers’ Behavior at 2nd to 6th of July 2018.

  14. 28 jun.

    We had the lovely opportunity of interviewing at the recent Blog post with video:

  15. 27 jun.

    Discover how traditional solutions fall short and get to know the new F5 DDoS Hybrid Defender:

  16. 27 jun.

    Coming in 4th place in OWASP's Top 10 is XML External Entity (XXE) Processing. Get a quick rundown of what XXE is and why you should care at

  17. 26 jun.

    We're hiring an Application Security analyst to help secure our sites with our web application firewall. Check out the post below for the application link and let me know if you have any questions!

  18. 26 jun.

    Have you heard of PASTA? Get a detailed overview on how this risk centric threat modeling methodology can improve your application risk management at

  19. 24 jun.

    What do you think about this VB .NET code (screenshot in comment), I might have a new way to exploit the SQLi here. Can you exploit this SQL injection in a normal web app, be honest? please leave your solution as a comment; I'm looking for more solutions

    Deze collectie tonen

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.