Web App Security

A road with START and FINISH painted on it.

Building Better Security: Part 1

According to the UK IT Governance blog, 148 million records were breached in December 2020! As stories of data breaches hit the news each day, many companies are trying to patch the security of their systems as quickly as possible. That’s a start, but it’s not enough. Security is not a

Continue reading →
Photo of red plastic bag in green grass

Environmentally-friendly XML

There’s a reason you pay for plastic shopping bags. It is to protect the environment. Durable shopping bags can be re-used, and don’t pollute our oceans and landfills. Re-use is a good thing – and not just for the environment. We know that code re-use is important. And that also

Continue reading →
Photo of surfer in waves with rocks

Riding the waves of CSRF

Cross-site request forgery (CSRF or XSRF) is also known as “Sea Surf” or “Session Riding”. But unlike real surfing, it’s got nothing to do with waves, water or the beach.

Continue reading →
Illustration of a policeman stopping a thief with the word XSS

How to stop XSS

Last week I wrote about Cross-Site Scripting, and the serious consequences it can have. According to OWASP, XSS affects about two thirds of all applications. That statistic should scare you! Now that I have your attention, let’s look at how we can stop XSS.

Continue reading →
Illustration of thief with bag over his shoulder and the word XSS

The X in XSS

I’ve mentioned Cross-Site Scripting, aka XSS, in some of my previous posts. And I’m sure you’ve heard of it as well. XSS is often categorised as either reflected XSS or stored XSS. And then DOM-based XSS was added. OWASP now categorises XSS as: Client XSS Server XSS Both of these can be either

Continue reading →
Squirrel monkey in a tree eating a cookie

Who stole the cookies?

No, we are not talking about delicious double-chocolate cookies. Although I’ve really missed the fabulous Incus Data cookies during lockdown. As you know, cookies are small text files. They are usually created by the web server, but are saved and managed by your browser. Cookies can be harmless or incredibly

Continue reading →
Carton of eggs with one broken egg

One Broken Egg…

I believe in code re-use. You believe in code re-use. No-one wants to re-invent the wheel, especially not if there is a really great, aero-dynamic, ultra-fast wheel available. That’s why we use libraries and components. But those libraries and components are not written by super-humans. They are written by people

Continue reading →
404 error message

Beware the Error Message

I hope that you already know that users hate meaningless error messages. (Actually they hate all error messages – don’t we all!) So that’s one reason to not allow default messages to display in your web application. But there is another important reason: security!

Continue reading →

Your First Line of Defence

In a previous post, I told you about the importance of using HTTPS instead of HTTP. Today I will look at some of the functionality that HTTPS adds in the form of security headers.

Continue reading →

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.