Menu
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Developer Training
Anti-FAQ's
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
close
Login to Portal
Book A Consultation
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Developer Training
Anti-FAQ's
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
Login to Portal
Book A Consultation
Advice from a Pentester to a CISO
The straight-forward-highly-opinionated security advice center.
What a pentester really wants to tell a CISO!
Submit
All Categories
Compliance and Policy
DevSecOps
Hacker Watercooler
Penetration Testing
Penetration Testing as a Service
Secure Application Design
Security in Emerging Tech
Security Strategy
Types of Vulnerabilities
Secure Application Design
Oct 26, 2018 by Sherif Koussa
Embedded Credentials in Source Code
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Types of Vulnerabilities
Oct 19, 2018 by Sherif Koussa
ImageMagick RCE Take 2
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Security in Emerging Tech
Sep 19, 2018 by Sherif Koussa
Machine Learning and Security: 3 Years Ago vs. Now
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Security Strategy
Sep 10, 2018 by Sherif Koussa
Passwords Shouldn't Be Hard, Don't Cause Your Next Breach
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
DevSecOps
Penetration Testing
Sep 5, 2018 by Sherif Koussa
DAST Tools: What They Are Good At Finding
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Types of Vulnerabilities
Aug 23, 2018 by Shashank Voore
Security Issues in JWT Authentication
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
26
No
6
Types of Vulnerabilities
Aug 15, 2017 by Sherif Koussa
Introduction to SQL Injection Mitigation
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
2
No
1
DevSecOps
Jul 6, 2017 by Sherif Koussa
Secure Scrum - Integrating Security with Agile
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
2
No
0
DevSecOps
Secure Application Design
Jul 6, 2017 by Sherif Koussa
Secure Application Configuration Basics
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
No items found
1
2
3
4
5
6
7
8
9
10
11
12
Join 4000+ followers for the latest on managing application security in emerging technologies.
Penetration Testing
-
Training
-
Testimonials
-
Blog
About Us
-
Contact Us
-
Partners
-
Careers
-
Book a Consultation
-
Privacy Policy
Office
301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4
Start A Conversation
+1 (800)-611-5741
[email protected]
Clutch
GitHub
LinkedIn
Twitter
Designed by
WP Expert
© 2023
Software Secured
star
close
arrow-up
chevron-down
twitter
github
caret-down
linkedin
ellipsis-v