OWASP Top 10

Our final entry in the OWASP Top 10 series - be aware of what your servers can access!
You do have logging enabled, right?
It's a three-in-one for the third last entry into our OWASP Top 10 series!
Don't get confused with authorisation, we're talking authENTICation this week.
Keep your stuff updated!!
From Insecure Design last week to Insecure Configuration this week!
It's hard to build a secure system if the design is inherently insecure.
i.e. Cross-Site Scripting (XSS), SQL injection (SQLi), and Command Injection
QmFzZSA2NCBpc24ndCBlbmNyeXB0aW9uIQ==
1
Let's dive into the first risk in the OWASP Top 10...
What is the OWASP Top 10, and why is it important?