Avatao Blog

Cybersecurity best practices, tips, and the latest news discussed by security professionals.
Read on to find the topic that interests you the most!

Featured article

GO vs C

GO vs C

Focusing on Go vs. C, we explore why Go may be better than C for developers: See differences in performance, usability, and memory safety.

Browse by category

owasp top 10
application software security
devsecops
expert interviews
secure coding best practices
it security for everyone

Latest posts

GO vs C

GO vs C

Focusing on Go vs. C, we explore why Go may be better than C for developers: See differences in performance, usability, and memory safety.

Top 5 Java frameworks in 2022

Top 5 Java frameworks in 2022

Selecting the right Java framework will help you get the most out of Java and build applications quickly and securely. In this guide, you’ll learn about the different types of Java frameworks, how to choose the best one for your project, and some of the advantages of using each.

Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java

Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other objectives like tight deadlines. This often results in products that are vulnerable to deserialization attacks which would be otherwise difficult to stage.

JWT handling best practices

JWT handling best practices

The purpose of this post is to present one of the most popular authorization manager open standards JWT. It goes into depth about what JWT is, how it works, why it is secure, and what the most common security pitfalls are.

Start your Secure Coding Training now!