Best practices in API security

Controlling home security from a mobile device

According to a recent report from Imperva (a Thales company), organizations lose $94- $186 billion every year to vulnerable or insecure APIs abused by bots. The report highlights that this security threat accounts for up to 11.8% of global cybersecurity events and losses, highlighting a new trend in cyberattacks. In this article, we want to […]

Best practices for web app developers: designing web apps with a secure architecture

A robust architecture is the foundation of a secure web application, and adhering to best practices is essential to mitigate risks effectively. In our previous articles, we have explored how to prevent application-level and network-level session hijacking attacks. Let’s now delve into design implementations for crafting a secure architecture for web applications.  Changing the way […]

Best practices for web app developers: preventing network-level session hijacking

In our previous article, we examined the best practices for preventing application-level hijacking attacks. We’ll now discuss using secure protocols to implement security measures for network-level session hijacking threats.  What is network-level session hijacking? Network-level session hijacking occurs when an unauthorized user intercepts and takes over a session between a client (in this case, a […]

Best practices for web app developers: preventing application-level session hijacking

Developers typically have one goal in mind: building functional, user-friendly applications. However, being a good coder only sometimes means that the application is well-built from a security perspective. Most of the time, security is an afterthought with last-minute modifications to comply with basic requirements.  There are so many threats to web applications that more than […]