Skip to content
Affinity IT Security
  • Cybersecurity Assessments
  • Compliance
  • Training
  • About
  • Contact
  • Articles

OUTSOURCE YOUR CYBERSECURITY

Increase security. Maintain compliance. Retain control.

Find Out How
Find and Fix Your Vulnerabilities.  Discretely. Now Find and Fix Your Vulnerabilities.  Discretely. Now

How To Prevent … ?

How To Prevent Information Leakage

December 11, 2017January 8, 2018 JoeHow To Prevent ... ?, Web Application Vulnerabilities
Preventing Information Leakage

If you are not familiar with the concept of CSV Injection, we suggest that you review the article entitled “What is Information Leakage ?“. If you are not familiar with how to detect CSV Injection, we suggest that you review […]

Read more

How To Prevent CSV Injection

December 8, 2017January 8, 2018 JoeHow To Prevent ... ?, Web Application Vulnerabilities
Preventing CSV Injection

If you are not familiar with the concept of CSV Injection, we suggest that you review the article entitled “What is CSV Injection ?“. If you are not familiar with how to detect CSV Injection, we suggest that you review […]

Read more

How To Prevent the Failure to Use HTTP Strict Transport Security (HSTS)

October 10, 2017January 8, 2018 JoeHow To Prevent ... ?, Web Application Vulnerabilities
Preventing Failure to Use Strict Transport Security

If you are not familiar with the concept of HTTP Strict Transport Security (HSTS), we suggest that you review the article entitled “What is HTTP Strict Transport Security ?“. For additional information about detecting the “Failure to Use HTTP Strict […]

Read more

How To Prevent Server-Side Request Forgery

August 14, 2017January 8, 2018 JoeHow To Prevent ... ?, Web Application Vulnerabilities
Preventing Server Side Request Forgery (XSRF)

If you are not familiar with the concept of Server-Side Request Forgery (SSRF), we suggest that you review the article entitled “What is Server-Side Request Forgery ?“. Server-side Request Forgery is the result of the failure to anticipate the malicious […]

Read more

How To Prevent Log Injection

July 6, 2017January 8, 2018 JoeHow To Prevent ... ?, Web Application Vulnerabilities
Preventing Log Injection

Preventing Log Injection If you are not already familiar with the concept of Log Injection, please review the article entitled “What Is Log Injection ?“. To learn more about how to detect Log Injection vulnerabilities, please see the article entitled […]

Read more

Posts navigation

Older posts

Recent Posts

  • Measuring Phishing Risk
  • Securing IoT Networks: Security Configuration and Capacity
  • Securing IoT Networks: Measuring Network Security
  • A Security Rating Model for the Internet of Things (IoT)
  • What is a Penetration Test ?
  • How To Become a Professional Hacker

Categories

  • 1O Things …
  • How To Prevent … ?
  • How To Test For … ?
  • Press Releases
  • Reasons Why…
  • Uncategorized
  • Web Application Vulnerabilities
  • What Is … ?

Cybersecurity is more critical than ever before. You need a partner with the right expertise.

Find and fix your vulnerabilities. Do it discreetly. Do it now.

Find and Fix Your Vulnerabilities. Discretely. Now

1243 Sussex Turnpike Suite #1, Randolph, NJ 07869
info@Affinity-IT.com
800.840.2335
  • 23 NYCRR 500 Compliance
  • About Us
  • Acme, Inc. Device Results Page
  • Acme, Inc. Static Evaluation Results
  • Affinity IT Security
  • Affinity IT Security Labs
  • Application Security Testing
  • Articles
  • Be a Professional Hacker
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Penetration Tester
  • Best Hacker School
  • Best Hacking School
  • CEH Bootcamp
  • CEH Certification
  • CEH Exam
  • CEH Exam Preparation
  • CEH Instruction
  • Certified Ethical Hacker (CEH) Exam
  • Certified Ethical Hacker (CEH) Training Class
  • Choose the RIGHT Cybersecurity Partner
  • Contact Us
  • Cybersecurity Compliance
  • Cybersecurity Compliance Inquiry
  • EC Council CEH Accredited Training Center
  • Ethical Hacker Course
  • Ethical Hacker Course
  • Ethical Hacking Course
  • Getting Your CEH
  • Hacker Bootcamp
  • Hacker Training
  • HIPAA Compliance
  • How Do We Evaluate Your Products ?
  • Information Security Assessments and Penetration Tests
  • Information Security Training Inquiry
  • Learn Ethical Hacking
  • Learn Penetration Testing
  • Learn PenTesting
  • Network Security Testing
  • Network Vulnerability Assessment
  • PCI DSS Compliance
  • Penetration Test Training
  • Penetration Testing and Vulnerability Assessments Inquiry
  • Penetration Testing Bootcamp
  • Penetration Testing Course
  • Penetration Testing School
  • Pentesting Bootcamp
  • Pentesting Course
  • Pentesting School
  • Prepare For The CEH Test
  • Request an Evaluation
  • Thank You
  • Training
  • Training Course: Application Security and the SDLC
  • Training Course: Designing Secure Web Applications
  • Training Course: Employee IT Security Awareness
  • Training Course: Fundamentals of IT Security
  • Training Course: Gathering and Documenting Web Application Security Requirements
  • Training Course: Testing Web Application Security
  • Training Course: Understanding HIPAA Security Compliance
  • Training Course: Understanding NERC-CIP
  • Training Course: Understanding PCI-DSS
  • Website Security Testing
  • Website Vulnerability Assessment
  • What Cybersecurity Services Do You Actually Need ?
Powered by WordPress | Theme: Astrid by aThemes.