Defining Threat Modeling and Its Role in the SDLC

Threat modeling is one of the most essential, and misunderstood, component of the software development lifecycle. It identifies potential threats and vulnerabilities early on in the process, mitigating the risk of attacks, and reduces the overall cost… Continue reading Defining Threat Modeling and Its Role in the SDLC

How to Improve Your Cloud and Container Security

Cloud architecture is the organization of components and capabilities that are necessary in order to leverage the power of cloud resources. Following the recent mass migration to the cloud, organizations are embracing best practices for architecting a… Continue reading How to Improve Your Cloud and Container Security

Unlock a New Level of Security at Secure Coding Virtual Summit

A lot of cyberattacks can be prevented by developers who have the right security tools and training. The challenge is that most do not have a full understanding of security best practices. At Secure Coding Virtual Summit, industry-leading AppSec and D… Continue reading Unlock a New Level of Security at Secure Coding Virtual Summit

What are reasonable level of security for a interal-use organization application hosted on the cloud?

I’m working on an small web application (Flask). The application is only for distributed internal usage, e.g. only users with credentials created by the organization will have access to the services beyond the Login page and the organizati… Continue reading What are reasonable level of security for a interal-use organization application hosted on the cloud?

allowing users to add custom html/js code and show it only under another domain

I have a web app where I allow users to create a one-page portfolio using drag and drop, also I allow them to add custom HTML freely (basically any html or js code)
I’m aware that I shouldn’t allow the custom HTML to be executed while they… Continue reading allowing users to add custom html/js code and show it only under another domain