Manicode

Musings on Software Engineering and Application Security from Jim Manico

Monday, July 14, 2014

OWASP Top Ten Proactive Controls

›
Jim Bird ( jimbird@shaw.ca ) just completed a 10-post blog series on the various OWASP Top Ten Proactive Controls. These articles have been...
Friday, December 13, 2013

Reflections on Password Complexity

›
Michael Coates started an interesting thread on the OWASP Leaders list about password policy complexity guidance. http://lists.owasp.org/pi...
Monday, January 14, 2013

SecAppDev 2013, 4-8 March, Leuven, Belgium

›
Dear all, We are pleased to announce SecAppDev Leuven 2013, an intensive one-week course in secure application development. The course is...
Friday, January 4, 2013

Handling Untrusted JSON Safely

›
JSON (JavaScript Object Notation) is quickly becoming the de-facto way to transport structured text data over the Web, a job also performe...
2 comments:
Sunday, February 13, 2011

Taming the Beast

›
The recent cross-platform numerical parsing DOS bug has been named the " Mark of the Beast ". Some claim that this bug was first ...
Sunday, January 9, 2011

Touchpoints and BSIMM hurt AppSec

›
Conjecture: BSIMM and Touchpoints are harmful to developers and organizations seeking cost effective application security based risk re...
2 comments:
Wednesday, June 30, 2010

Injection-safe templating languages

›
The state of the art for Cross Site Scripting (XSS) software engineering defense is, of course, contextual output encoding. This involves ma...
1 comment:
›
Home
View web version
Powered by Blogger.