Skip to content
Start a Project
Praetorian Secure
Cyber Security and Compliance Experts
Praetorian SecurePraetorian Secure
  • Home
  • Services
    • Application Security
      • DevSecOps Security
      • Mobile App Security Testing (MAS)
      • Web Application Security (WAS)
    • Cloud Security
    • Compliance
      • CMMC 2.0
        • CMMC Glossary
      • DFARS
      • HIPAA
      • NIST
    • Consulting
      • Gap Assessment
      • Cybersecurity Tabletop Exercises
      • Virtual CISO (vCISO)
      • Vulnerability Management
    • Cybersecurity for Small Business
    • MEDC Federal Grant Program
    • Penetration Testing
      • Medical Device Penetration Testing
    • Security Awareness Training
  • Markets
  • Resources
    • Blogs
    • Documents
    • Videos
  • About Us
  • Contact Us
Search:
NIST/CMMC Gap Assessmentinfo@praetoriansecure.com1.855.519.7328
  • Services
    • Application Security
      • DevSecOps Security
      • Mobile App Security Testing (MAS)
      • Web Application Security (WAS)
    • Cloud Security
    • Compliance
      • CMMC 2.0
        • CMMC Glossary
      • DFARS
      • HIPAA
      • NIST
    • Consulting
      • Gap Assessment
      • Cybersecurity Tabletop Exercises
      • Virtual CISO (vCISO)
      • Vulnerability Management
    • Cybersecurity for Small Business
    • MEDC Federal Grant Program
    • Penetration Testing
      • Medical Device Penetration Testing
    • Security Awareness Training
  • Markets
  • Resources
    • Blogs
    • Documents
    • Videos
  • About Us
  • Contact Us

Insecure Deserialization

OWASP Top 10 – #8 Insecure Deserialization

Application Security, Blogs, OWASP Top 10, Security Testing ServicesBy adminOctober 23, 2018

Coming in at #8 on the OWASP Top 10 List – 2017, Most Critical Web Application Security Risks is Insecure Deserialization. This vulnerability occurs when untrusted data is used to abuse the logic of an application or application program interface (API).

Known Vulnerabilites

OWASP Top 10 – #9 Using Components With Known Vulnerabilities

Application Security, Blogs, OWASP Top 10, Security Testing ServicesBy adminSeptember 19, 2018

Next, at #9 on the list, we have the use of components with known vulnerabilities. While this might sound easy to avoid, tight time constraints might cause developers to use whatever libraries it takes to get…

Logging & monitoring

OWASP Top 10 – #10 Logging & Monitoring

Application Security, Blogs, OWASP Top 10, Security Testing ServicesBy adminSeptember 11, 2018

With the recent growth of web-based applications, it is more important than ever to keep security in mind when developing or maintaining these applications. The Open Web Application Security Project (OWASP) has a list of…

Contact Us
  • Business Phone:
    1.855.519.7328
  • E-mail:
    Info@praetoriansecure.com
  • Business hours:
    Monday - Friday 8:00 am - 5:00 pm ET

Find us on:

Facebook page opens in new windowX page opens in new windowYouTube page opens in new windowLinkedin page opens in new windowInstagram page opens in new window
Services
  • Application Security
  • Consulting Services
  • Cybersecurity Compliance
  • Security Testing Services
  • Security Awareness Training
  • Third-Party Risk Management
  • vCISO Services
Compliance
  • CMMC 2.0
  • DFARS
  • HIPAA
  • NIST
  • NIST CSF
  • SOC 2
Resources
  • Client Success Stories
  • Solutions for Small Business (SMBs)
  • Cybersecurity Blog
  • Documents
  • MEDC Grant Program
  • Videos
SDVOSB
    Praetorian Secure
    © 2009 - 2025 Praetorian Secure. All Rights Reserved.
    • Terms of Use
    • Privacy Policy
    Useful links
    Go to Top

    You cannot copy content of this page