Offensive Security

Compliance

The road to secure crypto: start getting risk management priorities on your threat modeling radar

  • Karl Steinkamp

5 min read

Offensive Security

MIME sniffing in browsers and the security implications

  • Thought Leadership Team

5 min read

Offensive Security

Getting started with ZAP and the OWASP top 10: common questions

  • Dan Cornell

4 min read

Offensive Security

Android: DNS setup for developing and testing against local web services

  • Dan Cornell

3 min read

Offensive Security

Command injection in java: 80% proven that it is 100% impossible (sometimes)

  • Dan Cornell

2 min read

Offensive Security

Properties of secure hash functions

  • Thought Leadership Team

2 min read

ThreadFix

General Overview of Vulnerability Management

  • ThreadFix Team

3 min read

Application security

AppSec concerns: UUID generation

  • Thought Leadership Team

3 min read

Offensive Security

Asymmetric-key algorithms and symmetric-key algorithms

  • Thought Leadership Team

2 min read

Browse by topic

  • Cloud
  • Compliance
  • Compliance Essentials
  • Corporate
  • Application security
  • FedRAMP®
  • Hexeon
  • Strategy, privacy, and risk
  • ThreadFix
  • Offensive Security