
· Alex · security
Exploring the OWASP Mobile Top 10
Dive into each category of OWASP Mobile Top 10, how to implement in the SDLC and how to test

Dive into each category of OWASP Mobile Top 10, how to implement in the SDLC and how to test

How to setup, alternatives and best practices

Let's discuss about pen tests: from black box to white box to gray box testing, internal vs external, delved into social engineering, red, blue and purple teaming, importance and how to choose what's right for your organization.

Top 10 common security misconfigurations

Dangers of CSV injection, how to identify and mitigate

Digital signatures, how to choose the right algorithm, use cases and challenges