Rx iT World Hacking Tutorial
0
CI/CD Security
0

CI/CD pipelines and processes facilitate efficient, repeatable software builds and deployments; as such, they occupy an important role in the modern SDLC. ...

0
C-Based Toolchain Hardening
0

C-Based Toolchain Hardening is a treatment of project settings that will help you deliver reliable and secure code when using C, C++ and Objective C languages ...

0
Bean validation
0

Bean validation (JSR303 aka Bean Validation 1.0 /JSR349 aka Bean Validation 1.1) is one of the most common ways to perform input validation in Java. It is an ...

0
Authorization Testing Automation
0

Authorizations definition and implementation is one of the important protection measures of an application. They are defined in the creation phase of the ...

0
Authorization
0

Authorization may be defined as "the process of verifying that a requested action or service is approved for a specific entity" (NIST). Authorization is ...

0
Authentication
0

Authentication is the process of verifying that an individual, entity, or website is who/what it claims to be. Authentication in the context of web ...

0
Attack Surface Analysis
0

This article describes a simple and pragmatic way of doing Attack Surface Analysis and managing an application's Attack Surface. It is targeted to be used by ...

0
Abuse Case
0

Often when the security level of an application is mentioned in requirements, the following expressions are met: The application must be secure. The ...

0
AJAX Security
0

This document will provide a starting point for AJAX security and will hopefully be updated and expanded reasonably often to provide more detailed information ...

0
Types of API Tools
0

APIs are becoming an increasingly large portion of the software that powers the Internet including mobile applications, single-page applications (SPAs) and ...

0
What is a Virtual Patch?
0

This paper presents a virtual patching framework that organizations can follow to maximize the timely implementation of virtual patches. It also demonstrates, ...

0
Using the Java Cryptographic Extensions
0

The code included in this article has not been reviewed and should not be used without proper analysis. If you have reviewed the included code or portions of ...

0
Types of XSS
0

Early on, two primary types of XSS were identified, Stored XSS and Reflected XSS. In 2005, Amit Klein defined a third type of XSS, which Amit coined DOM Based ...

0
Threat Modeling Process
0

This document describes a structured approach to application threat modeling that enables you to identify, quantify, and address the security risks associated ...

0
Threat Modeling
0

Threat modeling works to identify, communicate, and understand threats and mitigations within the context of protecting something of value. A threat model is ...

0
Source code analysis tools
0

Source code analysis tools, also known as Static Application Security Testing (SAST) Tools, can help analyze source code or compiled versions of code to help ...

0
Slow Down Online Guessing Attacks with Device Cookies
0

Device cookies as additional authenticator for users devices have been discussed and used in practice for some time already. For example, it was discussed by ...

0
Session Timeout
0

Session timeout represents the event occuring when a user does not perform any action on a web site during an interval (defined by a web server). The event, on ...

0
SameSite
0

SameSite prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information ...

0
Secure Software Contract Annex
0

This contract Annex is intended to help software developers and their clients negotiate and capture important contractual terms and conditions related to the ...

RxHarun
Logo