Related resources for OWASP
  • A Comprehensive Guide to Secure Coding in C#4/16/2024 10:56:29 AM. A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
  • How to Configure Azure Application Gateway and WAF v2 4/15/2024 6:05:14 AM. We're configuring an Application Gateway to manage traffic for the demo application. Azure Application Gateway, a layer 7 solution, efficiently manages web traffic, ensuring optimal performance. T
  • How To Scan For OSS Vulnerabilities Using OWASP Dependency Check In .Net 6.04/11/2023 6:19:21 AM. In this article, you will learn how to do OSS vulnerabilities using OWASP Dependency Check in .Net 6.0.
  • All About OWASP #3 - Sensitive Data Exposure4/24/2019 9:34:38 AM. In this part of the study of OWASP Top 10 Threats, we will understand Threat # 3 – Sensitive Data Exposure.
  • All About OWASP #1 - SQL Injection Attack4/24/2019 4:01:32 AM. Considering security as the most important aspect of an application and as the First step in SOUND Programming Methodology, we will be covering SQL Injection Attack and Prevention.
  • All About OWASP #2 - Broken Authentication4/24/2019 4:01:05 AM. In this article, we will learn about Secure Programming of SOUND programming methodology. We will cover Broken Authentication from OWASP's top 10 security threats.
  • Top 10 Web Application Security Risks In 201712/17/2017 9:07:33 AM. List of Top 10 Web application security risks of 2017 and beyond.
  • Introduction To OWASP9/6/2017 5:06:31 PM. OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Securi
  • Static Code Analysis - Overview9/20/2015 7:50:46 AM. In this article you will get an overview of Static Code Analysis.
  • OWASP #5 Security Misconfiguration : Hardening your ASP.NET App4/2/2015 4:43:03 PM. There has been two resounding key points that have continued to surface when you’re analyzing each of these security flaws that might not be immediately obvious: authorization failure and application leakage. I bring that up now so you have an opportunity to see the pattern that continues to surface.
  • OWASP Top 10 Risks #2: Broken Authentication and Session Management10/17/2014 12:12:58 AM. Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where things can go wrong and how to prevent it.
  • OWASP Top 10 Vulnerabilities6/26/2013 12:11:36 AM. The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.