Visit HackEDU

HackEDU Blog

Stay up to date

Topic: Software Security

software security PCI Compliance

How to Go Beyond PCI Compliance to Secure Your Organization: Requirements 1-3

In the first post of this series, we discussed the Payment Card Industry Data Security Standard (PCI DSS), why it is important, and what the consequences are of being non-compliant. In...

Continue Reading

software security Application Security DevSecOps

Same-Origin Policy And Cross-Origin Resource Sharing (CORS)

Introduction Modern web browsers provide many built-in security mechanisms to defend against attackers. Same-origin policy, Cookie Policy, Content Security Policy, browser sandbox, and XSS...

Continue Reading

Secure Coding Training software security Application Security

Secure Software Development Defined

And how do you build an application security program? Software development follows what is called a Software Development Lifecycle, or S D L C. It is a process used for developing software....

Continue Reading

Secure Coding Training software security Application Security

Common Federated Identity Protocols: OpenID Connect vs OAuth vs SAML 2

Introduction When it comes to federated identity there are three major protocols used by companies: OAuth 2, OpenID Connect, and SAML. In this article we will examine their security...

Continue Reading

Stay up to date