Web Application Security
In an effort to re-familiarize myself with information security and specifically application security; I will be posting various posts regarding the exploitation of web applications and how to defend...
View ArticleAuthentication
What is Authentication? Authentication is a process by which a user’s identity is verified. A large number of web applications in production today use basic authentication or single-factor...
View ArticleOWASP Los Angeles
Hello Netizens Tonight I attended the OWASP Los Angeles Security Summit. I must mention that I had an awesome time listening to our featured speakers. Being involved and attending OWASP has really...
View ArticleAutomated Security Scanning in the Cloud
For small IT Security companies it’s very hard to find competitive pricing on Software-as-a-Service offerings for Automated Security Scanning solutions. On the other hand I did come across a great...
View ArticleINCAPSULA / IMPERVA CLOUD WAF POC & RESEARCH REPORT
Being connected to the Internet, and having a web presence in order to conduct business is potentially risky due to the fact that web attacks are constant threats to any organization. Realistically,...
View Article
More Pages to Explore .....