Blog

Author: Omkar Hiremath
Aug 2, 2023
by
Omkar Hiremath

Burp versus Zap

Read More
Jun 15, 2023
by
Omkar Hiremath

Comparison of STRIDE, DREAD & PASTA

Read More
Jun 5, 2023
by
Omkar Hiremath

How to Properly Secure Your JWTs

Read More
May 17, 2023
by
Omkar Hiremath

Risk of Security and Monitoring Logging Failures

Read More
May 1, 2023
by
Omkar Hiremath

Intro to Identification and Authentication Failures

Read More
Apr 5, 2023
by
Omkar Hiremath

How Threat Modeling Adds Value to a Penetration Test

Read More
Mar 24, 2023
by
Omkar Hiremath

What Are the Differences Between Different Open Source Fuzzing Tools

Read More
Mar 22, 2023
by
Omkar Hiremath

Mobile Penetration Tests: The 3 Major Mobile Security Controls

Read More
Mar 15, 2023
by
Omkar Hiremath

Protecting Your Organization With Open-source Intelligence (OSINT)

Read More
Feb 6, 2023
by
Omkar Hiremath

What is the Difference Between a High-quality and Low-quality Penetration Test

Read More
Jan 16, 2023
by
Omkar Hiremath

Why WAFs Are Not Enough

Read More
Jan 9, 2023
by
Omkar Hiremath

Top Vulnerabilities Found in APIs via Manual Testing

Read More

Like what you see?

Join 3000+ followers for the latest on managing application security in emerging technologies.
Office

301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4

Designed by WP Expert
© 2023
Software Secured
cross