The best Cybersecurity conference you never heard of

December 19, 2023 | Theresa Lanowitz

Broken Object Level Authorization: API Security’s Worst Enemy

March 14, 2023 | Thomas Jung

The content of this post is solely the responsibility of the author. LevelBlue ...

Choosing a DAST Solution: What to Pay Attention to?

November 01, 2022 | Alex Vakulov

The content of this post is solely the responsibility of the author. LevelBlue ...

10 Things cybercriminals love about you

March 23, 2022 | Mike Klepper

10 Ways organizations make attacks easy What do cybercriminals love? (Mostly ...

Top 12 client-side security threats

March 14, 2022 | Mike Klepper

Today’s web applications are complex, often made up of a mix of existing ...

Manual and semi-automated testing for Insecure Direct Object References (IDORs) using Burp Suite

December 29, 2021 | Irfan Shakeel

This blog was written by an independent guest blogger.

A guide to OWASP's secure coding

September 14, 2021 | Irfan Shakeel

This blog was written by an independent guest blogger.

Web application security - 2021 update

August 24, 2021 | Danyel Loyd-Tate

Now more than ever it is critical for businesses to be successful during the ...

Defending the client-side attack surface

May 14, 2021 | Mike Klepper

It is strange to think that not that long ago the Internet was a very different ...

Interview with Daniel Cid, founder of OSSEC

March 20, 2017 | Kate Brew

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...