DEV Community

loading...

# appsec

👋 Sign in for the ability sort posts by top and latest.
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

Reactions 7 Comments
7 min read
What do appsec and fire extinguishers have in common?

What do appsec and fire extinguishers have in common?

Reactions 6 Comments
3 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

Reactions 9 Comments
6 min read
Alice and Bob Learn: Chapter Discussions

Alice and Bob Learn: Chapter Discussions

Reactions 5 Comments
2 min read
One Year Anniversary of We Hack Purple

One Year Anniversary of We Hack Purple

Reactions 5 Comments
4 min read
Why I Joined the NeuraLegion Advisory Board

Why I Joined the NeuraLegion Advisory Board

Reactions 2 Comments
2 min read
Publishing an obfuscated kotlin library

Publishing an obfuscated kotlin library

Reactions 10 Comments
6 min read
How to get your boss to approve the training you want

How to get your boss to approve the training you want

Reactions 4 Comments
4 min read
Security is Everybody's Job - Part 6 - The Second Way

Security is Everybody's Job - Part 6 - The Second Way

Reactions 14 Comments
3 min read
Security is Everybody's Job - Part 5 - The First Way

Security is Everybody's Job - Part 5 - The First Way

Reactions 6 Comments
4 min read
Security is Everybody's Job - Part 4 - What is DevSecOps?

Security is Everybody's Job - Part 4 - What is DevSecOps?

Reactions 3 Comments
2 min read
Security is Everybody's Job - Part 3 - What IS DevOps?

Security is Everybody's Job - Part 3 - What IS DevOps?

Reactions 15 Comments
2 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

Reactions 12 Comments 1
2 min read
Using StackHawk in GitLab - Know Before You Go (Live)

Using StackHawk in GitLab - Know Before You Go (Live)

Reactions 6 Comments
7 min read
AMA: DevSecOps versus Secure SDLC

AMA: DevSecOps versus Secure SDLC

Reactions 7 Comments 2
1 min read
Scanning the Damn Vulnerable Web App with StackHawk

Scanning the Damn Vulnerable Web App with StackHawk

Reactions 8 Comments
10 min read
Security is Everybody's Job - Part 2 - What is application security?

Security is Everybody's Job - Part 2 - What is application security?

Reactions 28 Comments 3
4 min read
Security is Everybody's Job - Part 1 - DevSecOps

Security is Everybody's Job - Part 1 - DevSecOps

Reactions 54 Comments 2
3 min read
AMA AppSec: What would you tell University Students about Application Security?

AMA AppSec: What would you tell University Students about Application Security?

Reactions 6 Comments
2 min read
Quick Security in VS Code with CodeSweep

Quick Security in VS Code with CodeSweep

Reactions 2 Comments
2 min read
Conhecendo a OWASP

Conhecendo a OWASP

Reactions 3 Comments
3 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

Reactions 6 Comments
7 min read
The Importance of Inventory

The Importance of Inventory

Reactions 5 Comments
6 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Reactions 11 Comments
2 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Reactions 47 Comments
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

Reactions 18 Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Reactions 17 Comments
1 min read
Pushing Left, Like a Boss — Part 5.13 — HTTPS only

Pushing Left, Like a Boss — Part 5.13 — HTTPS only

Reactions 18 Comments
1 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Reactions 18 Comments 3
1 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

Reactions 10 Comments
1 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

Reactions 29 Comments 4
4 min read
Pushing Left, Like a Boss! -- Part 3: Secure Design

Pushing Left, Like a Boss! -- Part 3: Secure Design

Reactions 15 Comments 1
1 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

Reactions 74 Comments 5
1 min read
Security Headers for ASP.Net and .Net CORE

Security Headers for ASP.Net and .Net CORE

Reactions 17 Comments
3 min read
Demystifying SOP and CSP, featuring CORS

Demystifying SOP and CSP, featuring CORS

Reactions 15 Comments
11 min read
The Case for Automatic Updates

The Case for Automatic Updates

Reactions 11 Comments 1
5 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Reactions 2 Comments
1 min read
Hacking the SDLC: Win the Minds of your Developers

Hacking the SDLC: Win the Minds of your Developers

Reactions 5 Comments
4 min read
Security Champion

Security Champion

Reactions 6 Comments
2 min read
Containers Under Attack

Containers Under Attack

Reactions 20 Comments 9
1 min read
loading...