Security White Paper: OWASP - Building Secure Web Applications

Nowadays, software application security absolutely cannot be ignored and every IT professional must take this…

Read More


Jul 17, 2014 1 min read

Victoria De Belilovsky

OWASP

Ippon USA , What we have achieved in just 3 months!

[https://raw.githubusercontent.com/ippontech/blog-usa/master/images/2014/07/IpponUSA2014.jpg]…

Read More


Jul 10, 2014 1 min read

Romain Lheritier


Jul 08, 2014 1 min read

Romain Lheritier

Hypermedia API

Developing an API is something pretty usual today. There are many reasons behind this: the…

Read More


May 19, 2014 7 min read

David Martin

API

Ippon Technologies is setting up shop in a 3,500-square-foot office in Shockoe Bottom

We are very excited about our new office in Richmond by the river! Can’t…

Read More


May 07, 2014 1 min read

Romain Lheritier

Save your AngularJS code!

By Marina Sinama-Pongolle [https://www.linkedin.com/in/marinasinamapongolle] At this year’s Devoxx [http:…

Read More


May 06, 2014 2 min read

Romain Lheritier

Angular

Coaching Teams Through Change

By Victoria Pedron – @vghores [http://www.twitter.com/vghores] My favorite Scrumday [http://www.scrumday.…

Read More


Apr 29, 2014 1 min read

Romain Lheritier

Java 8's Stream API: a new way to manage collections

By Luc Clément – @luclement [http://www.twitter.com/luclement] Until now, processing collections or tables…

Read More


Apr 24, 2014 4 min read

Laurent Mathieu

API

Java 8 - Time Management

By Pierre Templier – @ptemplier [http://www.twitter.com/ptemplier] Java 8 includes a brand new…

Read More


Apr 22, 2014 3 min read

Laurent Mathieu

Java

From development to production with Vagrant and Packer

From development to production with Vagrant and Packer Have you heard of Vagrant? Vagrant [http:…

Read More


Apr 14, 2014 12 min read

Alexis Seigneurin

The Responsive Web Design Approach for the Liferay #3 Portal: The Often Forgotten Design

The Responsive Web Design approach for the Liferay #3 portal:  The often forgotten design 06…

Read More


Apr 01, 2014 12 min read

Laurent Mathieu

OWASP Top 10 - A10 Unvalidated Redirects and Forwards

Description If a user is redirected or forwarded to a page defined by an unverified…

Read More


Jan 29, 2014 2 min read

Philippe Cery

OWASP

OWASP Top 10 - A9 Using Components with Known Vulnerabilities

Description Known software vulnerabilities are available to everyone on the Internet. If an attacker knows…

Read More


Jan 28, 2014 3 min read

Philippe Cery

OWASP

OWASP Top 10 - A8 Cross-Site Request Forgery (CSRF)

Description An attacker sends a request to a website you are authenticated on to execute…

Read More


Jan 14, 2014 4 min read

Philippe Cery

OWASP

OWASP Top 10 - A7 Missing Function Level Access Control

Description In a web application with different user roles, authentication is not enough. Each request…

Read More


Dec 09, 2013 3 min read

Philippe Cery

OWASP