Secure by Design

A monthly digest of useful info about Secure by Design – what it is, why it matters, and tips on proactive security.

Subscribe to the newsletter →

April

Unlocking the OWASP ASVS for Secure by Design

Coming soon

May

Staying ahead: the importance of proactive security in software development

Coming soon

June

Harnessing AI for proactive security in Secure by Design

Coming soon

July

Overcoming common challenges in implementing Secure by Design

Coming soon

August

Cultivating a security-first culture for Secure by Design

Coming soon

September

Navigating security compliance and standards for Secure by Design

Coming soon

October

The economics of secure software development

Coming soon

November

Real–world success stories of Secure by Design

Coming soon

December

The future of secure software development

Coming soon

march

04 Mar 25

If you're struggling to know where to start with Secure by Design, there are few better places than the OWASP Top 10 - but what is it and why does it matter?

05 Mar 25

It's number one on OWASP's Top 10, but what exactly is 'Broken Access Control'? Let’s take a look.

06 Mar 25

Cryptographic Failures, number two on OWASP's Top 10, is one of the easiest to find real-world examples of damaging attacks. But what exactly are they and where can you start in preventing them.

11 Mar 25

Injection vulnerabilities have been a security risk for decades - and they're still a major issue today, appearing in the number three slot on the OWASP Top 10. Let's take a closer look at what they are.

Built in the UK. Securing products worldwide.

Logical Peak Ltd. ©