Blog

Category: Secure Application Design
Jan 23, 2023
by
Shimon Brathwaite

The Security Liabilities of 3rd Party Libraries

Read More
Jan 16, 2023
by
Omkar Hiremath

Why WAFs Are Not Enough

Read More
Aug 2, 2022
by
Omkar Hiremath

How to Secure Serverless Applications

Read More
Jun 20, 2022
by
Omkar Hiremath

What is LDAP and How is it Used?

Read More
Sep 16, 2021
by
Alex Hewko

Extreme Programming (XP) Approaches That Improve Application Security

Read More
Sep 9, 2021
by
Alex Hewko

Common Security Risks in UX Design

Read More
Sep 2, 2021
by
Alex Hewko

STRIDE Threat Modeling: What You Need to Know

Read More
Jun 10, 2021
by
Alex Hewko

3 Challenges of Implementing Threat Modeling into your SDLC

Read More
Feb 17, 2021
by
Sherif Koussa

What Is Threat Modeling & Why Is It Underestimated

Read More
Dec 5, 2018
by
Sherif Koussa

Secure Code Review Checklist [Downloadable]

Read More
Nov 2, 2018
by
Sherif Koussa

Comparing the Top 3 Federated Indentity Providers: OpenID, OAuth, SAML

Read More
Oct 26, 2018
by
Sherif Koussa

Embedded Credentials in Source Code

Read More

Like what you see?

Join 3000+ followers for the latest on managing application security in emerging technologies.
Office

301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4

Designed by WP Expert
© 2023
Software Secured
cross