TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About OWASP
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Atul Sharma (3)
Max McCarty (2)
Ayush Gupta (1)
Ziggy Rafiq (1)
Shanuka Maheshwaran (1)
Dhanapal Chandran (1)
Mahesh Chand (1)
Pradeep Yadav (1)
Santhi Maadhaven (1)
S Ravindran (1)
Related resources for OWASP
No resource found
OWASP TOP 10 Security Vulnerability and Remediation
11/13/2024 8:15:54 AM.
This session introduces OWASP's Top 10 vulnerabilities, emphasizing proactive security in web development. Covering each category, it promotes secure coding practices to prevent financial loss and
A Comprehensive Guide to Secure Coding in C#
4/16/2024 10:56:29 AM.
A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
How to Configure Azure Application Gateway and WAF v2
4/15/2024 6:05:14 AM.
We're configuring an Application Gateway to manage traffic for the demo application. Azure Application Gateway, a layer 7 solution, efficiently manages web traffic, ensuring optimal performance. T
How To Scan For OSS Vulnerabilities Using OWASP Dependency Check In .Net 6.0
4/11/2023 6:19:21 AM.
In this article, you will learn how to do OSS vulnerabilities using OWASP Dependency Check in .Net 6.0.
All About OWASP #3 - Sensitive Data Exposure
4/24/2019 9:34:38 AM.
In this part of the study of OWASP Top 10 Threats, we will understand Threat # 3 – Sensitive Data Exposure.
All About OWASP #1 - SQL Injection Attack
4/24/2019 4:01:32 AM.
Considering security as the most important aspect of an application and as the First step in SOUND Programming Methodology, we will be covering SQL Injection Attack and Prevention.
All About OWASP #2 - Broken Authentication
4/24/2019 4:01:05 AM.
In this article, we will learn about Secure Programming of SOUND programming methodology. We will cover Broken Authentication from OWASP's top 10 security threats.
Top 10 Web Application Security Risks In 2017
12/17/2017 9:07:33 AM.
List of Top 10 Web application security risks of 2017 and beyond.
Introduction To OWASP
9/6/2017 5:06:31 PM.
OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Securi
Static Code Analysis - Overview
9/20/2015 7:50:46 AM.
In this article you will get an overview of Static Code Analysis.
OWASP #5 Security Misconfiguration : Hardening your ASP.NET App
4/2/2015 4:43:03 PM.
There has been two resounding key points that have continued to surface when you’re analyzing each of these security flaws that might not be immediately obvious: authorization failure and application leakage. I bring that up now so you have an opportunity to see the pattern that continues to surface.
OWASP Top 10 Risks #2: Broken Authentication and Session Management
10/17/2014 12:12:58 AM.
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where things can go wrong and how to prevent it.
OWASP Top 10 Vulnerabilities
6/26/2013 12:11:36 AM.
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.