What is cryptography? To understand cryptographic failures, it is important to first understand cryptography. Cryptography is a method of securing communication so only authorized parties can access the information. It involves converting readable data (plaintext) into an unreadable format (ciphertext) using encryption algorithms. Only those…
Author Archives Alexa Rogers
Broken access control: An OWASP Top 10 risk
What is a broken access control vulnerability? Access control—also known as authorization—determines what authenticated users are allowed to do within a web application. While authentication verifies identity, access control governs permissions. Despite its conceptual simplicity, implementing effective access control is complex and frequently flawed. According…
Security logging and monitoring failures: OWASP Top 10
Security logging and monitoring failures are one of the most commonly overlooked risks in application security. Ranked in the OWASP Top 10, these failures can leave teams unaware of breaches until long after the damage is done. Without strong logging and monitoring practices, it’s difficult…