by John Verry | Mar 3, 2022 | Ethical Hacking
Reading Time: 3 minutes
The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last five years, you realize that the term application programming...
by John Verry | Aug 9, 2021 | InfoSec Strategies
Reading Time: 4 minutes
News flash for those who have been asleep for the last few years—there are a lot of security issues in IoT. When an issue rises to the level where it is a key component of a Presidential Executive Order, it’s pretty mainstream. Yet,...
by Richard Barrus | Mar 27, 2021 | IoT Security
Reading Time: 3 minutes
Anybody who is involved with securing or validating Internet of Things (IoT) solutions knows that they often involve a web of connections that can be (to put it mildly) tricky to navigate. How do you approach testing a complex...
by Richard Barrus | Mar 26, 2021 | IoT Security
Reading Time: 3 minutes
If you’re involved in information security, especially as a developer, you’ve likely come across the OWASP Foundation, a leading provider of web application security guidance. OWASP is poised to release its Internet of Things (IoT)...
by Richard Barrus | Mar 25, 2021 | IoT Security
Reading Time: 3 minutes
As a cybersecurity professional, you’ve probably heard of the nonprofit OWASP Foundation, a prominent authority on application security planet wide. OWASP is well-known for its Top 10 Vulnerabilities and Application Security...