Title Filter     Display # 
# Article Title Author
1 Understanding CRLF Injection Attacks Harry Wilson
2 Ensuring Email Security Gilad David Maayan
3 What Is XDR and How Can It Improve API Security? Sigal Zigelboim
4 Quishing Prevention: How Can Developers Create Secure QR Scanning Apps? Austin Dease
5 What You Need to Know About API Security Tom Lester
6 Using ABAC To Secure Your Applications Gilad David Maayan
7 Web Service Security: What You Should Know Gilad David Maayan
8 Five Things Developers Can Do To Address MitM Attacks Jeff Broth
9 How To Implement 2FA In Your Applications Sigal Zigelboim
10 DevSecOps Is Growing, But There's Room for Improvement Jeff Broth
11 Endpoint Security for Development Environments Gilad David Maayan
12 Six Tools To Protect Your Web Applications Sigal Zigelboim
13 The Importance of Securing IoT Devices Harry Wilson
14 Five Tips For Securing GitOps Environments Sigal Zigelboim
15 Secure Coding Best Practices for 2022 Sigal Zigelboim
16 The Encryption Witch Hunt Nikos Vaggalis
17 Scapegoating Encryption Nikos Vaggalis
18 Tactical Pentesting With Burp Suite Nikos Vaggalis