
Sam Bishop
Bio
Hi there! My name is Sam Bishop and I'm a passionate technologist who loves to express my thoughts through writing. As an individual and tech enthusiast, I'm always eager to share my perspectives on various topics.
Stories (32)
Filter by community
Best Dynamic Application Security Testing Tools
Dynamic application security testing is an integral part of applications’ security. It performs security testing in working applications. The primary motive of dynamic application security testing is to detect if there are any vulnerabilities or security flaws that exist in the system. It is because many vulnerabilities take place when the application is running.
By Sam Bishopabout a year ago in FYI
Session Hijacking – What is it and How to Prevent it?
Our day barely ends without surfing the internet, when in doubt – we log into different websites or portal to clear our queries. When users log in to the website that requires them to fill in a form, a session is generated. A session refers to the ongoing communication between two systems, which continues until the user terminates it. Initiating a session is crucial for internet-based communication, but it also introduces the potential risk of session hijacking.
By Sam Bishopabout a year ago in Education
A Quick Tour to Dynamic Application Security Testing (DAST)
When your web app is up and running, you finally sit back and relax for a while after pouring ample effort to make it reach its target audience. But what if you and your team come across some vulnerabilities that are still present in the application? The anxiety is unimaginable, right?
By Sam Bishopabout a year ago in FYI
Innovative Vulnerability Assessment Tools You Must Know
Vulnerability assessment is a comprehensive process that involves examining the entire system; hence, the process takes time to work its way through. But, sometimes, due to human error or outdated manual testing techniques, certain vulnerabilities can't be uncovered and can cause security risks to the organizations.
By Sam Bishopabout a year ago in FYI
Cross-Site Scripting – A Simplified and Succinct Explanation
Talking about web app security exploitation, everyday attackers are finding new ways to fulfill their nasty motives. This causes businesses to experience repercussions that are difficult to overcome. One such potential attack is cross-site scripting, where attackers target web applications to exploit their security by inserting malicious code.
By Sam Bishopabout a year ago in 01
The Rise of the Machines? Not Quite. The Future is Human-AI Collaboration. Content Warning.
Let's talk about the future of work, shall we? It's a topic that keeps everyone buzzing – from boardrooms to your morning commute. There's this constant buzz about AI taking over jobs, robots stealing our livelihoods, and the whole "machines are going to enslave us" narrative. Now, as someone who spends most of his waking hours neck-deep in the latest AI advancements, here's my take: hold your horses!
By Sam Bishop2 years ago in 01
AI Goes Undercover: Can You Spot the Robot Reporter?. Content Warning.
Remember those clunky chatbots and robotic voices from the early days of AI? Those days are long gone. Artificial intelligence (AI) has evolved at an astonishing pace, and now it's capable of feats that would have seemed like science fiction just a decade ago. Buckle up, because here's a mind-bender: AI can now write realistic news articles, so convincing they could pass scrutiny by even the most discerning reader.
By Sam Bishop2 years ago in 01
Staying Ahead of the Curve: Hunting Zero-Day Threats in Your Web App
The relentless cat-and-mouse game between developers and attackers defines the world of web application security. While developers strive to build secure applications, attackers constantly innovate, searching for vulnerabilities to exploit. This is where zero-day threats enter the fray – novel attack vectors unknown to security vendors, leaving applications wide open.
By Sam Bishop2 years ago in 01





