Menu
Services
Penetration Testing as a Service
Baseline Penetration Testing
Developer Training
Portal
The Reporting Platform
Slack Integration
Resources
Blog
Case Studies
Testimonials
Company
About Us
Partners
Careers
Contact Us
close
Book A Consultation
Services
Penetration Testing as a Service
Baseline Penetration Testing
Developer Training
Portal
The Reporting Platform
Slack Integration
Resources
Blog
Case Studies
Testimonials
Company
About Us
Partners
Careers
Contact Us
Book A Consultation
The Application Security Blog
Discover technical resources, security industry trends, opinion pieces, and more.
Submit
Aug 23, 2018 by Shashank Voore
Security Issues in JWT Authentication
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
16
No
5
Aug 15, 2017 by Sherif Koussa
Introduction to SQL Injection Mitigation
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
1
Jul 6, 2017 by Sherif Koussa
Secure Scrum - Integrating Security with Agile
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Jul 6, 2017 by Sherif Koussa
Secure Application Configuration Basics
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Jun 23, 2017 by Sherif Koussa
Application Security Code Review Introduction
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Jun 6, 2017 by Sherif Koussa
Differentiating Federated Identities: OpenID Connect, SAML v2.0, and OAuth 2.0
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Oct 25, 2016 by Sherif Koussa
Getting Started Integrating Security into the SDLC
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Sep 7, 2016 by Sherif Koussa
There is More to Application Security than Bulletproof Code
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Aug 4, 2016 by Sherif Koussa
Why Your Network Protection Strategy Won't Protect Your Applications
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
No items found
1
2
3
4
5
6
7
8
9
Like what you see?
Join 2500+ followers for the latest on managing application security in emerging technologies.
Your Name
Email
Submit
Penetration Testing
-
Training
-
Testimonials
-
Blog
About Us
-
Contact Us
-
Partners
-
Careers
-
Book a Consultation
Office
301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4
Start A Conversation
+1 (800)-611-5741
[email protected]
Clutch
GitHub
LinkedIn
Twitter
Designed by
WP Expert
Privacy Policy
© 2022
Software Secured
star
close
arrow-up
chevron-down
twitter
github
caret-down
linkedin
ellipsis-v