Is Engineering Leadership Responsible for Legal and Business Accountability in the SDLC? — Probely

Is Engineering Leadership Responsible for Legal and Business Accountability in the SDLC? — Probely

Who is responsible for the software development lifecycle (SDLC) in your business? It may seem like the CEO and/or Board of Directors are ultimately responsible for the SDLC. However, with changing times and regulations, such as the SEC’s crackdown on security incident reporting affecting enterprise CISOs like in the case of SolarWinds, the responsibility may […]

How to avoid common password vulnerabilities

Weak passwords and password reuse are still some of the most serious concerns for cybersecurity. There are several ways to increase password security but they are often not adopted by users and administrators. Here’s how you can make sure that sensitive data in your web application is not compromised by malicious hackers due to insecure […]

SecDevOps vs. DevSecOps: A Comparison by Acunetix

DevSecOps is a relatively new approach to continuous software development processes in agile environments. It is an extension of DevOps (Development + Operations) that includes the automation of security. The order of component terms in the DevSecOps name, however, may lead to incorrect application security approaches. That is why some sources propose SecDevOps as a […]

Understanding Server-Side Request Forgery (SSRF)

Server-side request forgery (SSRF) is the only type of vulnerability that has its own category in the OWASP Top 10 2021 list. Several major cybersecurity breaches in recent years, including Capital One and MS Exchange attacks, involved the use of SSRF as one of the break-in techniques. SSRF vulnerabilities let an attacker send crafted requests […]

Three Essential Principles for Secure Coding Practices

All security vulnerabilities are the result of human error. Most web application vulnerabilities and API security issues are introduced by developers. Therefore, the best approach to building secure applications is to do all that is possible to avoid introducing such errors in the first place instead of fixing them. You can find several detailed guides on how […]

Harnessing the Strength of Modern DAST: Miles Technologies

DAST has come a long way from its humble beginnings. Many businesses searching for web application security solutions are still apprehensive of DAST because they perceive it the way it was many years ago. DAST tools are often described as slow, not automated, not integrated, with limited reach and accuracy, and not usable for DevSecOps. […]

Understanding Broken Link Hijacking

Broken link hijacking (BLH) is a type of web attack. It exploits external links that are no longer valid. If your website or web application uses resources loaded from external URLs or points to such resources and these resources are no longer there (for example due to an expired domain), attackers can exploit these links […]

Developers’ Guide to SQL Injection Defense

In this cheat sheet, we will assume that: You are a developer or you know programming You have limited web application security knowledge You need to know how SQL injection attacks happen You need to know how to fix SQL injection issues in your code In this cheat sheet, you will learn: How do malicious […]

5 Simple Steps to Harden Your Web System

To harden a computer system means to make it more difficult for a malicious hacker to attack. In formal terms, system hardening means reducing the attack surface – the attack surface is the combination of all the points where an attacker may strike. Many computer systems by default have a very large attack surface. This […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC