It is no longer uncommon for us to look in various places and find IoT devices, they are in our homes and companies, or even with us on a…
The process of security requirements analysis can be an arduous task. In this article we will see how automation through Python scripting…
This article is part of a series that explores the practices of the OWASP SAMM (Software Assurance Maturity Model) [1] framework. This…
First, why do we need an S-SDLC or even an SDLC?
The answers to these two questions are straightforward. In today’s world…
Adoption of best practices in application security (AppSec) is crucial to ensure application and data protection throughout the software…
Software development organizations are constantly pressured to meet security standards [1]. Seeking to attend to this market demand, the…
In the latest edition of OWASP TOP 10 Vulnerabilities 2021, some new categories were introduced in their classifications. In this article…
Applications are constantly under development, with new features being implemented and updated. Security requirements are necessary to…
“The security architecture practice focuses on managing architectural risks for the software solution.” Before we talk about…