In this part of study of OWASP Top 10, We will understand the Threat # 3 – Sensitive Data Exposure.
Continue readingTag: Secure Programming
SOUND – S for Secure Programming #2 | OWASP #2 | Broken Authentication
As a part of Secure Programming of SOUND Programming Methodology we will cover #2 Threat from OWASP Top 10 — Broken Authentication
Continue readingSOUND – S for Secure Programming #1 | OWASP #1 | Injection Attack
After introduction of SOUND, As part of Secure Programming, we will be covering SQL Injection attack in detail and other OWASP top 10 Threats.
Continue readingSOUND : An Effective Coding and Code Review Technique
Here is very basic technique to integrate relevant Non-Functional Requirements in your Coding and Code Review Process and be more reliable.
Continue reading