Building a Secure API - Part 1

API security doesn't have to be confusing if you build it in from the start.


Build Security In - Introduction (Part 1)

Get started building security into your applications


 Securing Legacy Applications - Part 2
Securing Legacy Applications - Part 2

Securing legacy code can be tricky, here's a few more hints

Read more


Secure Legacy Application Series Part2

 Securing Legacy Applications - Part 1
Securing Legacy Applications - Part 1

Securing legacy code can be tricky, here's a few "quick hits" to get you started

Read more


Secure Legacy Application Series Part1

 Defaulting to Secure
Defaulting to Secure

Defaulting to secure settings in your tools helps keep the world a safer place

Read more


Default Secure Settings

 Passwords are Dead, Long Live Passwords
Passwords are Dead, Long Live Passwords

Passwords are a thorn in the security of any application. How can we fix this?

Read more


Password Policy Reuse Storage

 The Importance of Effective Validation
The Importance of Effective Validation

Good validation practices on incoming data can save lots of trouble down the line.

Read more


Input Validation Validate Data

Read more articles


Enjoying the articles and tutorials here on Websec.io? Consider becoming a patron with a one-time or recurring donation!
Search

Securing PHP

The Securing PHP ebook series helps introduce you to basic security concepts and some of the most common security issues in web applications.