Menu
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Anti-FAQ's
Developer Training
Comparison of Services
Industries
Penetration Testing for Security Companies
Penetration Testing for FinTech Companies
Penetration Testing for MedTech Companies
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Compliance
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
close
Login to Portal
Book A Consultation
Search for:
Services
Penetration Testing as a Service (PTaaS)
Pentest 360
Anti-FAQ's
Developer Training
Comparison of Services
Industries
Penetration Testing for Security Companies
Penetration Testing for FinTech Companies
Penetration Testing for MedTech Companies
Portal
Vulnerability Management Portal
Slack Integration
Resources
Blog
Whitepapers
Case Studies
Testimonials
Compliance
Company
About Us
Partners
Careers
News & Press
Events & Recordings
Policies
Contact Us
Login to Portal
Book A Consultation
Blog
Category:
Secure Application Design
Jan 23, 2023
by
Shimon Brathwaite
The Security Liabilities of 3rd Party Libraries
Read More
Jan 16, 2023
by
Omkar Hiremath
Why WAFs Are Not Enough
Read More
Aug 2, 2022
by
Omkar Hiremath
How to Secure Serverless Applications
Read More
Jun 20, 2022
by
Omkar Hiremath
What is LDAP and How is it Used?
Read More
Sep 16, 2021
by
Alex Hewko
Extreme Programming (XP) Approaches That Improve Application Security
Read More
Sep 9, 2021
by
Alex Hewko
Common Security Risks in UX Design
Read More
Sep 2, 2021
by
Alex Hewko
STRIDE Threat Modeling: What You Need to Know
Read More
Jun 10, 2021
by
Alex Hewko
3 Challenges of Implementing Threat Modeling into your SDLC
Read More
Feb 17, 2021
by
Sherif Koussa
What Is Threat Modeling & Why Is It Underestimated
Read More
Dec 5, 2018
by
Sherif Koussa
Secure Code Review Checklist [Downloadable]
Read More
Nov 2, 2018
by
Sherif Koussa
Comparing the Top 3 Federated Indentity Providers: OpenID, OAuth, SAML
Read More
Oct 26, 2018
by
Sherif Koussa
Embedded Credentials in Source Code
Read More
1
2
Next »
Like what you see?
Join 3000+ followers for the latest on managing application security in emerging technologies.
Penetration Testing
-
Training
-
Testimonials
-
Blog
About Us
-
Contact Us
-
Partners
-
Careers
-
Book a Consultation
-
Privacy Policy
Office
301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4
Start A Conversation
+1 (800)-611-5741
[email protected]
Clutch
GitHub
LinkedIn
Twitter
Designed by
WP Expert
© 2023
Software Secured
star
close
chevron-right
arrow-up
chevron-down
twitter
github
caret-down
linkedin
ellipsis-v
cross
search