25 Aug Application Security | Category - Pivot Point Security What is Threat Modeling and How Does It Differ from Risk Assessment? January 15, 2024 By Richard Barrus Threat modeling is a vital but often overlooked component of the software development lifecycle for secure web applications. “The soone... Continue reading
28 Jul Application Security | Category - Pivot Point Security Why Data Flow Mapping is Key to Web App Security Testing January 15, 2024 By Richard Barrus The Application Security Verification Standard (ASVS) V4 from the Open Web Application Security Project (OWASP) was created to help the... Continue reading
17 Jul Application Security | Category - Pivot Point Security OWASP ASVS Levels: Which is Right for My Application? January 14, 2024 By Richard Barrus The Application Security Verification Standard (ASVS) from the Open Web Application Security Project (OWASP) is intended to elevate the... Continue reading
13 Jul Application Security | Category - Pivot Point Security OWASP Top 10 Versus OWASP ASVS: Recommendations and Roadmap January 14, 2024 By Richard Barrus The Open Web Application Security Project (OWASP) offers the cybersecurity community a tremendous amount of valuable guidance, like its... Continue reading
10 Jul Application Security | Category - Pivot Point Security You Should Probably Rethink How You’re Using the OWASP Top 10 January 15, 2024 By Richard Barrus You Should Probably Rethink How You’re Using the OWASP Top 10 The legendary Open Web Application Security Project (OWASP) “Top Ten Web... Continue reading