<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">

Your [Users’] Browsers, Crypto Mining and $24

I wrote a little while back about the AppSec Serenity Prayer and talked about things you can and can’t control in terms ...

Cryptocurrency Mining Where You Least Expect it

While working onsite with a client something popped into the Incident Response Queue and the client had to leap into ...

Reports of CSRF's demise have been greatly exaggerated

When the new OWASP Top 10 came out in December 2017, I was somewhat enthusiastic about one of the items dropping off: ...

Get Phished

So you’re using the latest technologies, developing secure code, and maybe even doing some internal or external ...

Security and Risk – A Business Primer Part II

After going through the steps outlined in Part I, now you have an updated plan and you know where you need to go. So ...

Security and Risk – A Business Primer Part I

If I had a dollar for every time I went into a business on a security engagement and found it to be either inadequately ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments