I do not usually write retrospectives on conferences I have attended, but this was something else altogether. What was.
Here’s how I prepare for conferences
Public speaking can be enormously empowering and fulfilling. I have spoken at quite a few international conferences – I.
CSRF Tokens? What Tokens?
In a previous blog post where I covered Cross-Site Request Forgery and what potential impacts and consequences such an.
Bank-grade Security or Why Blocking Password Pasting is not a Good Security Strategy
Your friend creates a website. You are curious and you ask him: “is it secure?”, which, in your mind,.
Carriage Return Line Feed (CRLF) Injection Explained
How does a server know when a new header begins and the old one ends or when a line.
2017 OWASP Top 10 for PHP Developers Part 10: Insufficient Logging & Monitoring
Another day, another web application gets hacked. Most of the time web application hacks fly under the radar and are.
2017 OWASP Top 10 for PHP Developers Part 9: Using Components with Known Vulnerabilities
Attacks on today’s web are an unsurprising reality – websites are hacked daily, data is being stolen and leaked.
2017 OWASP Top 10 for PHP Developers Part 8: Insecure Deserialization
When developing a web application, web developers sometimes need to first turn data into a proper format so that.
2017 OWASP Top 10 for PHP Developers Part 7: Cross-Site Scripting (XSS)
We have all seen search forms, haven’t we? Take a look at mine: The above search form is pretty.