loading...
Joy Winter profile picture

Joy Winter

I am an entrepreneur living in Portland who loves to help others by sharing her knowledge about effective marketing and cybersecurity hacks.

Joined Joined on  Twitter logo
Work

Cyber Security Specialist

How to Integrate Security Into a DevOps Cycle

Reactions 11
5 min read

Secure SDLC and Best Practices for Outsourcing

Reactions 7
6 min read

How to Prevent Data Loss: 13 Simple Ways

Reactions 32
7 min read

10 Best Practices for Application Security in the Cloud

Reactions 7
7 min read

How To Secure Your Software Development Life Cycle (SDLC)

Reactions 8
6 min read

What is DevSecOps, and How Does it Help Build Secure Web Applications?

Reactions 6
6 min read

Advantages of a Secure Software Development Life Cycle (SDLC)

Reactions 6
5 min read

What is an Agile SDLC Model and What Are its Advantages?

Reactions 5
5 min read

3 Static Application Security Testing advantages (SAST) You Should Know

Reactions 6 Comments 1
4 min read

3 Open Source Security Risks and How to Address Them: What You Need to Know

Reactions 11 Comments 2
7 min read

Outsource Application Security: Should You Consider It?

Reactions 6 Comments 1
4 min read

Major DevOps Challenges and How to Address Them

Reactions 30 Comments 5
10 min read

7 Cloud Computing Security Vulnerabilities and What to Do About Them

Reactions 13
10 min read

7 Mobile App Security Risks and How to Mitigate Them

Reactions 14
8 min read

7 Top Benefits of Outsourcing Security Services

Reactions 11
6 min read

5 of the Top Cybersecurity Risks & Ways to Address Them in 2020

Reactions 8
1 min read

What You Need to Know About Cyber Security in the Cloud

Reactions 26
6 min read

Pre-Launch Android App Security Checklist

Reactions 28 Comments 3
6 min read

OWASP Top 10 Mobile Vulnerabilities Developers Need to Understand

Reactions 10
6 min read

The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

Reactions 6
7 min read

White Box and Black Box Testing: Outlining the Difference Between Them

Reactions 8
7 min read

How To Prevent Data Tampering In Your Business

Reactions 7
6 min read

7 Types of Malware Attacks and How to Prevent Them

Reactions 30
8 min read

What is Third-Party Risk Assessment and How Can You Do It?

Reactions 6 Comments 2
5 min read

SAST vs. DAST: Understanding the Differences Between Them

Reactions 9
7 min read

How to Protect Your Data from Unauthorized Access

Reactions 9
9 min read

6 Password Security Risks and How to Avoid Them

Reactions 104 Comments 4
9 min read

Mobile App Security Vulnerabilities and How to Mitigate Them

Reactions 2
1 min read

How to Improve Your DevOps Test Automation Strategy

Reactions 36
7 min read

Security Authentication vs. Authorization: What You Need to Know

Reactions 67 Comments 5
5 min read

How to Do Security Testing Manually: 12 Effective Ways

Reactions 7
10 min read

How to Perform Threat Modeling & Security Analysis in 5 Steps

Reactions 9
5 min read

9 Secure Code Review Best Practices For Your Web Application

Reactions 103 Comments 5
7 min read

Vulnerability Management: 5 Best Practices to Protect Your Business

Reactions 7
9 min read

The Impact of Security Misconfiguration and Its Mitigation

Reactions 2
4 min read

21 Best Practices for AWS Cloud Security

Reactions 9
9 min read

How to Perform a Cyber Security Risk Assessment: A Step-by-Step Guide

Reactions 8
4 min read

5 DevOps Monitoring Strategies for Your Application

Reactions 39
7 min read

What are the Differences Between DevOps and Agile? (Infographic)

Reactions 3 Comments 1
1 min read

Effects a Data Breach Can Have on Your Business in the Long Term

Reactions 1
2 min read

Predictive vs. Adaptive SDLC: What is the Difference?

Reactions 2
5 min read

Differences Between Static Code Analysis and Dynamic Testing

Reactions 6
5 min read

How to Ensure Security in Your SaaS Application

Reactions 6
8 min read

Announcing The New Normal

Reactions 0
2 min read

6 Cloud Security Challenges and How to Address Them

Reactions 3
8 min read

Data Storage Security: 5 Best Practices to Secure Your Data

Reactions 6 Comments 1
2 min read

Major Limitations of Penetration Testing You Need to Know

Reactions 8
2 min read
loading...