-
I get this ['"" [label="https://www.topgallant-partners.com"]']
-
Description:
Authentication and authorization are the most important security considerations in the cloud-native ecosystem, as evidenced by their high ranking in the OWASP Top 10 and OWASP Top 10 API…
-
- Site: [https://owasp.org](https://owasp.org)
**New Alerts**
- **Hash Disclosure - Mac OSX salted SHA-1** [10097] total: 1:
- [https://owasp.org/www-project-top-10-in-xr/](https://owasp.org…
-
#### Description
It would be good to know what kind of coverage we have against OWASP API top 10 and OWASP top 10 vulnerabilities in backend. https://owasp.org/www-project-api-security/ and https…
-
**Is your feature request related to a problem? Please describe.**
A documentation page around all the vulnerabilities that currently exist in crAPI will be very helpful. This will provide an easy wa…
-
-
_Marque las opciones con una "x" ejemplo: - [x] opción_
**¿Qué tipo de propuesta deseas realizar?**
- [x] Charla (compartir un tema)
- [ ] Workshop (Taller)
- [ ] Aviso de trabajo / Anuncio / …
-
https://www.youtube.com/watch?v=DYwn4KciL1U&list=PLjxrf2q8roU3LvrdR8Hv_phLrTj0xmjnD&index=26
Flutter セキュリティリスクTop10
詳しい話はここにまとまっている。
https://docs.flutter.dev/security
-
It can be a good idea to collect the actions spread on each section of the guide to show how the top 10 of OWASP are covered. That way we can also verify that we have all them covered.
It also serve…
-
I really like the MLSecOps document shared by Ericson: https://www.ericsson.com/en/reports-and-papers/white-papers/mlsecops-protecting-the-ai-ml-lifecycle-in-telecom
1. I would like to show where …