
Introducing a OWASP Game for threat modeling Agentic AI, Cloud, Devops, Frontend, LLM, Automation, and Web
Shift-left doesn't start with scanning the code for security vulnerabilities; it begins with...

Organization profile
We improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10.
Browse the latest writing surfaced through DevArt.

Shift-left doesn't start with scanning the code for security vulnerabilities; it begins with...

At the OWASP Cornucopia project, we are done with updating the cards and help pages for the Website...

Why do we keep our darkest fears secret? Publish them, and bring light to the darkest corners of your...

Would you like to be our card game designer for the OWASP Cornucopia Website Edition...

Shift-left doesn't start with scanning the code for security vulnerabilities; it begins with...

At OWASP Cornucopia we have long stated that we will create more decks, and now we...

The clouds can be a scary place. All these machines that simply aren't yours. So, how can...

Are you letting the AI do the threat modeling for you? There is no need to let the machines...

The pandemic drove a considerable increase in fully remote teams, which made card games quite...

OWASP® Cornucopia is launching brand-new versions of the OWASP Cornucopia decks with QR...

In Admincontrol, both our Android app and our IOS app just passed the MASVS 2.0...

Did you know that there is a game for threat modelling mobile apps? In Admincontrol we are...

After exploring how to create a secure and persistent application architecture in Secure &...

by Carlos Holguera and Sven Schleier In cyber security staying ahead of potential threats and...

What is Input validation Input validation is one of the basic security controls that help...

By Martin Belov & Starr Brown In the previous article we learned how to develop security...

Building requirements is one of the first steps in the SDLC, where we define the goals and objectives...

In the face of increasing cyberattacks, application security is becoming critical, requiring...

Intro to Application Security A developer-focused series about the fundamentals...

As you might now, we recently released OWASP® Cornucopia 2.0 with two new editions, but did...

I started out as a web designer 16 years ago and my first website got brutally hacked, not...

The OWASP Top 10 is a collection of the most common application security risks, based around...

by Donnie Brown As we navigate through an increasingly digital world, the landscape of internet...

by Adam Shostack Wouldn't it be nice to be able to anticipate security problems and design to...

by Ziv Daniel Hagbi Hello to all Citizen Developers out there! Are you using Low-Code/No-Code...

by Erlend Oftendal and Naane Baars SQL injection was introduced in an article by Rain Forrest Puppy...

by Aaron Guzman and Jason C. McDonald The recent release of the Office of the National Cyber...