Archimydes’ Post

View organization page for Archimydes, graphic

634 followers

In the first edition of the series, we explored exactly what the 5 code-related vulnerabilities from OWASP were. Now, let's dive into these further with real-world scenario examples of each with corresponding potential mitigations. This article is written by Prabu Karuppiah, a Full-stack Application Developer who is part of the Archimydes Guild. #engineering #securecode #tech #softwaredevelopment #softwareengineering #vulnerability

Secure code - real world scenarios

Secure code - real world scenarios

Archimydes on LinkedIn

To view or add a comment, sign in

Explore topics