
· Alex · security
Exploring the OWASP Mobile Top 10
Dive into each category of OWASP Mobile Top 10, how to implement in the SDLC and how to test
Dive into each category of OWASP Mobile Top 10, how to implement in the SDLC and how to test
How to setup, alternatives and best practices
Let's discuss about pen tests: from black box to white box to gray box testing, internal vs external, delved into social engineering, red, blue and purple teaming, importance and how to choose what's right for your organization.
Top 10 common security misconfigurations
Dangers of CSV injection, how to identify and mitigate
Digital signatures, how to choose the right algorithm, use cases and challenges