Lightboard Lessons: OWASP Top 10 - Security Misconfiguration
The OWASP Top 10 is a list of the most common security risks on the Internet today. Security Misconfiguration comes in at the #6spot in the latest edition of the OWASP Top 10. In this video, John discusses how to avoid security misconfiguration and outlines some mitigation steps to make sure your web application stays secure. Related Resources: Securing against the OWASP Top 10: Security misconfiguration457Views0likes0CommentsLightboard Lessons: OWASP Top 10 - Cross Site Scripting
The OWASP Top 10 is a list of the most common security risks on the Internet today. Cross Site Scripting (XSS)comes in at the #7spot in the latest edition of the OWASP Top 10. In this video, John discusses how Cross Site Scripting worksand outlines some mitigation steps to make sure your web application stays secure against this threat. Related Resources: Securing against the OWASP Top 10: Cross-Site Scripting670Views0likes0CommentsLightboard Lessons: OWASP Top 10 - Insecure Deserialization
The OWASP Top 10 is a list of the most common security risks on the Internet today. Insecure Deserialization comes in at the #8spot in the latest edition of the OWASP Top 10. In this video, John discusses this vulnerability and outlines some mitigation steps to make sure your web application stays secure against this threat. Related Resources: Securing against the OWASP Top 10: Insecure Deserialization1.3KViews0likes2CommentsLightboard Lessons: OWASP Top 10 - Broken Authentication
The OWASP Top 10 is a list of the most common security risks on the Internet today. Broken Authentication comes in at the #2 spot in the latest edition of the OWASP Top 10. In this video, John discusses broken authenticationand outlines some mitigation steps to make sure your web application doesn't give access tothe wrong users. Related Resources: Securing against the OWASP Top 10: Broken Authentication1.1KViews0likes0CommentsLightboard Lessons: OWASP Top 10 - Sensitive Data Exposure
The OWASP Top 10 is a list of the most common security risks on the Internet today. Sensitive Data Exposurecomes in at the #3spot in the latest edition of the OWASP Top 10. In this video, John discusses this security riskand outlines some mitigation steps to make sure your web application doesn't expose any sensitive data. Related Resources: Securing against the OWASP Top 10: Sensitive Data Exposure610Views0likes0CommentsLightboard Lessons: OWASP Top 10 - Injection Attacks
The OWASP Top 10 is a list of the most common security risks on the Internet today. For the past several years, "Injection Attack" has been the #1 security risk on the Top 10 list. In this video, John discusses injection attacks and outlines some mitigation steps to make sure your web application doesn't fall prey to one of these harmful attacks. Related Resources: OWASP Mitigation Strategies: Injection Attacks Securing against the OWASP Top 10: Injection attacks What is the OWASP Top Ten?1.3KViews0likes0CommentsLightboard Lessons: OWASP Top 10 - Insufficient Logging and Monitoring
The OWASP Top 10 is a list of the most common security risks on the Internet today. The #10riskin the latest edition of the OWASP Top 10 is "Insufficient Logging and Monitoring". Logging and monitoring are sometimes viewed as not the most interesting topics, but these are both extremely important. Log entries can help you identify if/when you are attacked, and monitoring those log files will allow you to take action against the attackers. In this video, John discusses this security riskand outlines some mitigation steps to make sure your web application stays secure. Related Resources: Securing against the OWASP Top 10: Insufficient Logging and Monitoring OWASP Logging Cheat Sheet600Views0likes0CommentsLightboard Lessons: OWASP Top 10 - XML External Entities
The OWASP Top 10 is a list of the most common security risks on the Internet today. XML External Entities comes in at the #4spot in the latest edition of the OWASP Top 10. In this video, John discusses this security riskand outlines some mitigation steps to make sure your web application doesn't process malicious XML data and expose sensitive information. Related Resources: Securing against the OWASP Top 10: XML External Entity attacks639Views0likes0CommentsLightboard Lessons: OWASP Top 10 - Using Components With Known Vulnerabilities
The OWASP Top 10 is a list of the most common security risks on the Internet today. The #9riskin the latest edition of the OWASP Top 10 is "Using Components With Known Vulnerabilities". It may seem obvious that you wouldn't want to use components in your web application that have known vulnerabilities, but it's easier said than done. In this video, John discusses this problemand outlines some mitigation steps to make sure your web application stays secure. Related Resources: Securing against the OWASP Top 10: Using Components With Known Vulnerabilities Common Vulnerabilities and Exposures(CVE)Database National Vulnerability Database (NVD)624Views0likes0CommentsLightboard Lessons: What is OpenShift?
The OpenShift Container Platform from RedHat is a platform as a service leveraging Docker and Kubernetes to provide app developers an easy button for application management, deployment, and scale. In this episode of Lightboard Lessons, Jason Rahm builds on his earlier videos on Docker and Kubernetes to discuss the value-added building blocks that OpenShift brings to the container table. Resources What are Containers? (video) What is Kubernetes? (video) What is Kubernetes? (DevCentral Basics article) Introduction to F5 Container Ingress Services686Views1like0Comments