DEV Community

# appsec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What is Minimum Viable Security (MVS) and how does it improve the life of developers?

What is Minimum Viable Security (MVS) and how does it improve the life of developers?

Reactions 6 Comments 1
6 min read
Encryption in â›… cloud native apps

Encryption in â›… cloud native apps

Reactions 11 Comments
3 min read
Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

Reactions 4 Comments
5 min read
How to Approach DevSecOps Security Automation

How to Approach DevSecOps Security Automation

Reactions 5 Comments
5 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

Reactions 15 Comments 3
2 min read
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

Reactions 7 Comments
5 min read
Spring Boot: Prevent Log Injection Attacks With Logback

Spring Boot: Prevent Log Injection Attacks With Logback

Reactions 5 Comments
4 min read
Exploring đźš©đźš©đźš©red flags in React Native security libraries

Exploring đźš©đźš©đźš©red flags in React Native security libraries

Reactions 7 Comments
2 min read
How to build a secure crypto wallet

How to build a secure crypto wallet

Reactions 11 Comments 2
1 min read
Authentication bypass in cryptography library

Authentication bypass in cryptography library

Reactions 5 Comments
3 min read
Secure by default, unsafe by you

Secure by default, unsafe by you

Reactions 14 Comments
2 min read
Security by incident and surprise

Security by incident and surprise

Reactions 5 Comments
4 min read
Corona Virus Threat Modelling

Corona Virus Threat Modelling

Reactions 2 Comments
4 min read
Angular Security - Disable Inline Critical CSS

Angular Security - Disable Inline Critical CSS

Reactions 5 Comments 2
2 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

Reactions 4 Comments
4 min read
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

Reactions 7 Comments
7 min read
What do appsec and fire extinguishers have in common?

What do appsec and fire extinguishers have in common?

Reactions 10 Comments
3 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

Reactions 9 Comments
6 min read
Alice and Bob Learn: Chapter Discussions

Alice and Bob Learn: Chapter Discussions

Reactions 5 Comments
2 min read
One Year Anniversary of We Hack Purple

One Year Anniversary of We Hack Purple

Reactions 5 Comments
4 min read
Why I Joined the NeuraLegion Advisory Board

Why I Joined the NeuraLegion Advisory Board

Reactions 2 Comments
2 min read
Publishing an obfuscated kotlin library

Publishing an obfuscated kotlin library

Reactions 14 Comments
6 min read
How to get your boss to approve the training you want

How to get your boss to approve the training you want

Reactions 4 Comments
4 min read
Security is Everybody's Job - Part 6 - The Second Way

Security is Everybody's Job - Part 6 - The Second Way

Reactions 14 Comments
3 min read
Security is Everybody's Job - Part 5 - The First Way

Security is Everybody's Job - Part 5 - The First Way

Reactions 6 Comments
4 min read
Security is Everybody's Job - Part 4 - What is DevSecOps?

Security is Everybody's Job - Part 4 - What is DevSecOps?

Reactions 3 Comments
2 min read
Security is Everybody's Job - Part 3 - What IS DevOps?

Security is Everybody's Job - Part 3 - What IS DevOps?

Reactions 16 Comments
2 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

Reactions 12 Comments 1
2 min read
Using StackHawk in GitLab - Know Before You Go (Live)

Using StackHawk in GitLab - Know Before You Go (Live)

Reactions 6 Comments
7 min read
AMA: DevSecOps versus Secure SDLC

AMA: DevSecOps versus Secure SDLC

Reactions 8 Comments 2
1 min read
Scanning the Damn Vulnerable Web App with StackHawk

Scanning the Damn Vulnerable Web App with StackHawk

Reactions 8 Comments
10 min read
Security is Everybody's Job - Part 2 - What is application security?

Security is Everybody's Job - Part 2 - What is application security?

Reactions 30 Comments 3
4 min read
AppSec: Some testing technique explained DAST, SAST, IAST, OSA/SCA

AppSec: Some testing technique explained DAST, SAST, IAST, OSA/SCA

Reactions 6 Comments
7 min read
Security is Everybody's Job - Part 1 - DevSecOps

Security is Everybody's Job - Part 1 - DevSecOps

Reactions 55 Comments 2
3 min read
AMA AppSec: What would you tell University Students about Application Security?

AMA AppSec: What would you tell University Students about Application Security?

Reactions 6 Comments
2 min read
Quick Security in VS Code with CodeSweep

Quick Security in VS Code with CodeSweep

Reactions 2 Comments
2 min read
Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Reactions 2 Comments
1 min read
Conhecendo a OWASP

Conhecendo a OWASP

Reactions 3 Comments
3 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

Reactions 8 Comments
7 min read
The Importance of Inventory

The Importance of Inventory

Reactions 5 Comments
6 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Reactions 11 Comments
2 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Reactions 49 Comments
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

Reactions 18 Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Reactions 17 Comments
1 min read
Pushing Left, Like a Boss — Part 5.13 — HTTPS only

Pushing Left, Like a Boss — Part 5.13 — HTTPS only

Reactions 18 Comments
1 min read
Security Champion

Security Champion

Reactions 7 Comments
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Reactions 18 Comments 3
1 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

Reactions 10 Comments
1 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

Reactions 29 Comments 4
4 min read
Pushing Left, Like a Boss! -- Part 3: Secure Design

Pushing Left, Like a Boss! -- Part 3: Secure Design

Reactions 15 Comments 1
1 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

Reactions 75 Comments 5
1 min read
Security Headers for ASP.Net and .Net CORE

Security Headers for ASP.Net and .Net CORE

Reactions 18 Comments
3 min read
Demystifying SOP and CSP, featuring CORS

Demystifying SOP and CSP, featuring CORS

Reactions 15 Comments
11 min read
The Case for Automatic Updates

The Case for Automatic Updates

Reactions 11 Comments 1
5 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Reactions 2 Comments
1 min read
Hacking the SDLC: Win the Minds of your Developers

Hacking the SDLC: Win the Minds of your Developers

Reactions 5 Comments
4 min read
Containers Under Attack

Containers Under Attack

Reactions 20 Comments 9
1 min read
loading...