Menu
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Developer Training
Anti-FAQ's
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
close
Login to Portal
Book A Consultation
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Developer Training
Anti-FAQ's
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
Login to Portal
Book A Consultation
Advice from a Pentester to a CISO
The straight-forward-highly-opinionated security advice center.
What a pentester really wants to tell a CISO!
Submit
All Categories
Compliance and Policy
DevSecOps
Hacker Watercooler
Penetration Testing
Penetration Testing as a Service
Secure Application Design
Security in Emerging Tech
Security Strategy
Types of Vulnerabilities
Types of Vulnerabilities
Jul 25, 2022 by Omkar Hiremath
Introduction to Cryptographic Failures
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
4
No
1
Types of Vulnerabilities
Jul 18, 2022 by Shimon Brathwaite
Why OWASP Top 10 is Moving from Individual Vulnerabilities to Categories
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Types of Vulnerabilities
Jul 11, 2022 by Omkar Hiremath
Introduction to Server Side Request Forgery (SSRF)
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Types of Vulnerabilities
Jul 4, 2022 by Shimon Brathwaite
How OWASP is Shifting From Mitigating Risks to Encouraging Best Practices
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Compliance and Policy
Jun 27, 2022 by Martin Cozzi
What is a SOC 2 Report and Why Are Your Clients Asking For It?
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Secure Application Design
Jun 20, 2022 by Omkar Hiremath
What is LDAP and How is it Used?
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
1
Compliance and Policy
Jun 13, 2022 by Cate Callegari
Cybersecurity Laws & Regulations in Canada
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
Types of Vulnerabilities
Jun 6, 2022 by Shimon Brathwaite
The Rise of Island Hopping Attacks
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
1
No
0
Types of Vulnerabilities
May 30, 2022 by Sherif Koussa
What is Privilege Escalation?
Read more
Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes
0
No
0
No items found
1
2
3
4
5
6
7
8
9
10
11
12
Join 4000+ followers for the latest on managing application security in emerging technologies.
Penetration Testing
-
Training
-
Testimonials
-
Blog
About Us
-
Contact Us
-
Partners
-
Careers
-
Book a Consultation
-
Privacy Policy
Office
301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4
Start A Conversation
+1 (800)-611-5741
[email protected]
Clutch
GitHub
LinkedIn
Twitter
Designed by
WP Expert
© 2023
Software Secured
star
close
arrow-up
chevron-down
twitter
github
caret-down
linkedin
ellipsis-v