Security Blog

Feature development & monitoring tips

Category: OWASP Top 10

September 12, 2022

OWASP Verification Standard: Application Security and Standards

OWASP Verification Standard: Application Security and Standards At the beginning of August, CREST partnered with OWASP to release the OWASP Verification Standard (OVS), which is designed to formalise and expand on OWASP’s existing work on application security and their own security standards, including their Top 10 Project. OWASP has existed since December 2001 and has […]

Find Out More
July 18, 2022

OWASP Top Ten: Insecure Design

 OWASP Top Ten: Insecure Design A new addition to the OWASP Top Ten, Insecure design is one of the leading causes of data breaches today. By understanding and avoiding these patterns, you can make your Web Applications more secure. In this blog post, we will give you a brief overview of Insecure Design and provide […]

Find Out More
July 4, 2022

OWASP Top Ten: Injection

OWASP Top Ten: Injection Injection is one of the top OWASP vulnerabilities for a reason. It can allow attackers to inject their own malicious code into programs, which can result in serious security breaches. This blog post will discuss what injection is, how it occurs, and some of the most common attack vectors. We will […]

Find Out More