Jan 4, 20225 minStop Using OWASP For Your AppSec Program BlueprintMany application security programs are using the OWASP Top 10 as a blueprint for their program, rather than using it as a prompt.
Nov 29, 20215 minAddressing API Vulnerabilities in 2022: Part IIIImplementing a more reliable, strategic approach to API Remediation through a program office, central data platform, and add-on accelerators
Nov 23, 20214 minAddressing API Vulnerabilities in 2022: Part IIAPIs will become the most frequent attack vector by 2022, causing data breaches for enterprise web applications.