Menu
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Anti-FAQ's
Developer Training
Comparison of Services
Industries
Penetration Testing for Security Companies
Penetration Testing for FinTech Companies
Penetration Testing for MedTech Companies
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Compliance
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
close
Login to Portal
Book A Consultation
Search for:
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Anti-FAQ's
Developer Training
Comparison of Services
Industries
Penetration Testing for Security Companies
Penetration Testing for FinTech Companies
Penetration Testing for MedTech Companies
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Compliance
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
Login to Portal
Book A Consultation
Advice from a Pentester to a CISO
The straight-forward-highly-opinionated security advice center.
What a pentester really wants to tell a CISO!
Submit
All Categories
Compliance and Policy
DevSecOps
Hacker Watercooler
News
Penetration Testing
Penetration Testing as a Service
Portal
Secure Application Design
Security in Emerging Tech
Security Strategy
Types of Vulnerabilities
DevSecOps
Sep 7, 2016 by Sherif Koussa
There is More to Application Security than Bulletproof Code
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Secure Application Design
Security Strategy
Aug 4, 2016 by Sherif Koussa
Why Your Network Protection Strategy Won't Protect Your Applications
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
DevSecOps
Security Strategy
Jul 21, 2016 by Sherif Koussa
Five Reasons Your Internal Application Security Program Is Failing
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
1
DevSecOps
Secure Application Design
Jun 21, 2016 by Sherif Koussa
Why Don't Developers Write More Secure Code?
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Security Strategy
May 28, 2016 by Sherif Koussa
Quantifying Software Security Risk
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Security Strategy
May 28, 2016 by Sherif Koussa
13 Tools for Checking the Security Risk of Open-Source Dependencies
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Types of Vulnerabilities
Mar 1, 2016 by Sherif Koussa
How to Confirm Whether You are Vulnerable to the DROWN Attack
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Types of Vulnerabilities
Oct 1, 2015 by Sherif Koussa
The Rise of JavaScript XSS and Practical Mitigation Techniques
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Secure Application Design
Security Strategy
Jul 21, 2015 by Sherif Koussa
How to Quickly Audit Your Cryptography Usage?
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
1
No items found
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Join 4000+ followers for the latest on managing application security in emerging technologies.
Penetration Testing
-
Training
-
Testimonials
-
Blog
About Us
-
Contact Us
-
Partners
-
Careers
-
Book a Consultation
-
Privacy Policy
Office
301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4
Start A Conversation
+1 (800)-611-5741
[email protected]
Clutch
GitHub
LinkedIn
Twitter
Designed by
WP Expert
© 2023
Software Secured
star
close
arrow-up
chevron-down
twitter
github
caret-down
linkedin
ellipsis-v
cross
search