Within the OWASP community, there are several projects related to AppSec, among them a series entitled TOP 10, which has specific subjects…
Is it possible to create a collaborative environment between security and development? Consider this scenario:
A senior developer with 15…
Subresource Integrity (SRI) is a technique that can help protect web applications against attacks originating from content providers. When…
Adoption of best practices in application security (AppSec) is crucial to ensure application and data protection throughout the software…
Developing secure applications is a constant challenge for enterprises. As the amount of data generated and stored increases, security has…
Performance, scalability, and usability are some of the factors that development teams typically take into consideration when planning the…
In recent years, we have heard a lot about terms like DevOps and DevSecOps, and a quick search reveals many job vacancies for these roles.
In this article, we will continue the series of publications on the OWASP SAMM (Software Assurance Maturity Model) by addressing the…
First and foremost, Application Security (AppSec) must be integrated into every step of the development process, including build, release…