Key lessons about cybersecurity breaches in 2022 give us insight into how to improve AppSec and DevSecOps in 2023.
Key lessons about cybersecurity breaches in 2022 give us insight into how to improve AppSec and DevSecOps in 2023.
Coveros is partnering with Tidelift to help ensure secure, healthy, and well-maintained software supply chain.
Prevention and detection are key tools in medicine. Stopping a serious illness from growing worse is easier when doctors find it early, because it usually saves the money, time, and physical and emotional stress that comes with prolonged illness and aggressive treatment. There’s no comparison between the personal impact a serious illness has on patients […]
Application Security pioneer and OWASP co-founder Jeff Williams discusses software supply chain attacks with Coveros CEO Jeff Payne.
Software security expert and CEO Jeff Payne discusses best practices for protecting your software delivery process from supply chain attacks in our next Coveros Conversation.
Explore some pros and cons of Bottlerocket, the Linux-based open-source operating system by Amazon Web Services for running containers.
Explore four different threat modeling methodologies—STRIDE, PASTA, Trike, VAST—and assess their strengths and weaknesses.
Welcome to the second half of my two-part blog on Understanding Session Management. In part 1, we covered what was session management and started digging into some possible attack types associated with this vulnerability. Here we will continue to look into other associated attack types. 4. Cross-Site Request Forgery (CSRF) – Severity: High “Cross-Site Request […]
Session Management has always been one of the OWASP Top 10. Take a look of the most recent two OWASP Top 10s. Top 10, 2013: A2 – Broken Authentication and Session Management Top 10, 2017: A2 – Broken Authentication Under the description of A2 of Top 10, 2017, it says, “Application functions related to authentication […]
What is application security, or AppSec? Let’s talk about web application security first. OWASP was created in 2001 and has been known as the best community for web application security. Volumes of online resources for web application security defects, security testing, and security projects have been produced by OWASP. Yet web application security is only […]