The Open Web Application Security Project (OWASP) has released an updated draft of its ranking of the top 10 vulnerabilities. The draft release marks the first changes to...
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice...
The Principle of Least Privilege is one of the longest standing principles of security. People (as well as applications) should only have access to the things they need...
Recent Comments