How to Protect Your Website: PHP Security Tips and Tricks #2 Updated: 23 Dec. 2020 This article does not replace a good knowledge of security principles in PHP, but can give you some good advices that really boo... 19.08 Applications
How to Protect Your Website : PHP Security Tips and Tricks #1 Updated: 1 Dec. 2020 PHP remains the most popular server-side programming language: it is used by almost 80% of websites (source). This language conti... 12.08 Applications
What are Business Logic Flaws on Web Applications? Updated: 16 Feb. 2021 Business logic flaws remain a type of little-known vulnerability in IT-Security. They are not errors in the logical reasoning, b... 08.07 Applications
How 2 factor authentication works and how to implement it What is 2FA Two Factor Authentication (2FA) is a way to strengthen users authentication.A good example is when you want to trigger a bank transfer fro... 03.06 Applications
Choosing the right web application firewall The need for web application firewalls If you don’t perfectly see the difference between a firewall and a web application firewall, I recommend you re... 21.05 Applications
Traditional Firewalls or Web Application Firewalls? Traditional firewalls protect IT environments against external attacks, by allowing and blocking connections to certain areas. These firewalls control... 30.04 Applications
Secure your website with HTTP headers Sometimes security can represent a heavy investment in terms of web development.But there are some tiny adjustments that you can implement on your web... 01.04 Applications
How often should you conduct a pentest on your website? Some years ago this was a common question: should I conduct a pentest on my website? Today the real question is: how often should I conduct a pentest?... 25.03 Applications
The 3 configuration modes for Web Application Firewalls Web Application Firewalls (commonly referred to as WAF) are mainly designed to protect web applications. But what exact roles can they play in a web a... 11.03 Applications
Web application filters and WAF: why using them? As cybersecurity issues increase, Web application filters and Web Application Firewalls are becoming more popular. These tools can be an excellent fir... 24.02 Applications
How HTTPS works and how to install it We’ve been hearing a lot of things about HTTPS during the past months, and the Heartbleed “bug” has its responsibility in that phenomenon. There was a... 23.01 Applications
Understanding web vulnerabilities in 5 min – Episode #10 – Unvalidated redirects and forwards This flaw is ranked #10 on the OWASP Top 10. It is the last one of the top 10, so it is not the most “important” but is doesn’t mean we can ignore it,... 26.11 Applications