Discover The Best Low-Code Platform
Wina Arambule |
2 Min.

Web Development Security in GeneXus + OWASP Top 10

Security in web development is a critical concern in today’s digital era. In this post, we share three videos featuring GeneXus experts who delve into the security considerations integrated into the GeneXus development process through the GeneXus Access Manager (GAM). You will also explore the categories of the OWASP Top 10 Web list focused on applications developed with GeneXus, as well as the OWASP Top 10 list for LLMs, crucial for identifying the most critical vulnerabilities found in applications using LLM.

Adopting good development practices, conducting regular audits, and staying informed about security updates are key points that contribute to ensuring robust web applications protected against potential threats.

Below, we share the three talks presented at the
GeneXus Meeting – GX30

, related to computer security:

1. Security in Enterprise Applications and the Development Process

Computer security is fundamental in GeneXus, and a key piece of this equation is the GeneXus Access Manager (GAM). This component provides a comprehensive solution for managing authentication and authorization in applications developed with GeneXus. In this talk, you will learn about the security considerations integrated into GeneXus development, focusing on the Security Scanner and the GeneXus Access Manager (GAM).

2. OWASP Top 10 Web and GeneXus

The Open Web Application Security Project (OWASP) maintains a list of the 10 most critical security risks in web applications. Among them are vulnerabilities such as SQL injections, authentication failures, exposure of sensitive data, and more. In this talk, you will learn how security is addressed in solutions created with GeneXus and what actions developers of web applications in GeneXus should take to mitigate the impact of each threat category.

3. Potential Security Issues in LLMs

In this conference, potential security issues in LLMs are examined, and some examples of attacks and countermeasures are shared, based on the OWASP Top 10 for LLM.

You may also be interested in reading:

37 talks about software and Artificial Intelligence

Security Scanner: a static analysis tool

System security: All about the new authentication schemes with GeneXus

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top