DEV Community

loading...
Vickie Li profile picture

Vickie Li

404 bio not found

Joined Joined on  twitter website
How to Prevent Supply Chain Attacks by Securing DevOps

How to Prevent Supply Chain Attacks by Securing DevOps

Reactions 1 Comments
6 min read
XStream Vulnerabilities — Detection & Mitigation

XStream Vulnerabilities — Detection & Mitigation

Comments
4 min read
API Security 101: Excessive Data Exposure

API Security 101: Excessive Data Exposure

Reactions 1 Comments
4 min read
Connecting RaaS, REvil, Kaseya and your security posture

Connecting RaaS, REvil, Kaseya and your security posture

Comments
7 min read
Main Branch #5

Main Branch #5

Comments
1 min read
SAST vs. DAST vs. SCA: A Comparison

SAST vs. DAST vs. SCA: A Comparison

Comments
4 min read
API Security 101: Broken User Authentication

API Security 101: Broken User Authentication

Comments
4 min read
API Security 101: Broken Object Level Authorization

API Security 101: Broken Object Level Authorization

Comments
4 min read
Main Branch #3

Main Branch #3

Comments
1 min read
Why Your Code Is A Graph

Why Your Code Is A Graph

Reactions 4 Comments
6 min read
Main Branch #2

Main Branch #2

Comments
1 min read
AppSec Conference: Shifting Left 2.0

AppSec Conference: Shifting Left 2.0

Comments
3 min read
Beating the OWASP Benchmark with Alok Shukla

Beating the OWASP Benchmark with Alok Shukla

Comments
1 min read
Main Branch #01

Main Branch #01

Comments
1 min read
Static Analysis of Python Applications

Static Analysis of Python Applications

Comments
2 min read
Closing the Developer Security Skills Gap

Closing the Developer Security Skills Gap

Reactions 1 Comments
3 min read
Beating the OWASP Benchmark

Beating the OWASP Benchmark

Comments
7 min read
Introducing “Attacker Reachability”: Reduce open-source vulnerability tickets by 90% or more.

Introducing “Attacker Reachability”: Reduce open-source vulnerability tickets by 90% or more.

Comments
6 min read
Announcing ShiftLeft CORE — A Code Security Platform

Announcing ShiftLeft CORE — A Code Security Platform

Comments
3 min read
Detecting Sensitive Data Leaks That Matter

Detecting Sensitive Data Leaks That Matter

Comments
6 min read
How to Start Tracking Your Application Dependencies

How to Start Tracking Your Application Dependencies

Comments
2 min read
Scanning for Secrets in Source Code

Scanning for Secrets in Source Code

Reactions 4 Comments
4 min read
How To Review Code For Vulnerabilities

How To Review Code For Vulnerabilities

Reactions 1 Comments
4 min read
loading...