Precious Ishiguzorupi-cloud9.hashnode.dev·Feb 20, 2023API Security Top 10 and Web Application Security Top 10: The Similarities, Differences & Threat modelsIntroduction API Security Top 10 and Web Application Security Top 10 are two lists of top vulnerabilities published by the Open Web Application Security Project (OWASP). These lists aim to provide guidance to software developers, security professiona...Discuss·319 reads#apisecurity
Veronica Petersverawrites.hashnode.dev·Jun 10, 2022Threat ModellingThreat modelling is basically a structured proactive process that helps organizations identify(early enough) and understand potential threats that their software faces and also helps them find ways to address the threats. Threat modelling is benefici...Discuss·2 likes·31 reads#threats #securitybydesign #threatmodelling #cybersecutity