What are the best DevSecOps-friendly application security platforms?
What is an open redirection vulnerability and how to prevent it
What are man-in-the-middle attacks (MITM) and how to avoid them
XSS Auditors – Abuses, Updates and Protection
What is the command injection vulnerability?
What is remote file inclusion?
The Problem of String Concatenation and Format String Vulnerabilities
Information Disclosure Vulnerability, Attacks, and Example
Announcing the Enterprise Web Security Best Practices Whitepaper