DEV Community

Cdebrincat profile picture

Cdebrincat

404 bio not found

Joined Joined on  github website
HIPAA Compliance for Healthcare Apps

HIPAA Compliance for Healthcare Apps

Comments
4 min read
What to do about CWEs in your application

What to do about CWEs in your application

Reactions 1 Comments
3 min read
OWASP Updates the Top 10 Web Application Security Risks

OWASP Updates the Top 10 Web Application Security Risks

Reactions 2 Comments
6 min read
Evolving Threat series — Infiltrating NPM’s Supply Chain (UA-Parser-js)

Evolving Threat series — Infiltrating NPM’s Supply Chain (UA-Parser-js)

Reactions 3 Comments
4 min read
CWE-77

CWE-77

Comments
2 min read
What happened in the Twitch Breach…

What happened in the Twitch Breach…

Comments
5 min read
CWE-918

CWE-918

Comments
2 min read
Finding Sensitive Data Leaks In Code Using ShiftLeft CORE

Finding Sensitive Data Leaks In Code Using ShiftLeft CORE

Comments
6 min read
CWE-200

CWE-200

Comments
2 min read
API Security 101: Insufficient Logging and Monitoring

API Security 101: Insufficient Logging and Monitoring

Comments
3 min read
CWE-89

CWE-89

Comments
2 min read
CWE-78

CWE-78

Comments
2 min read
CWE-611

CWE-611

Comments
2 min read
API Security 101: Improper Assets Management

API Security 101: Improper Assets Management

Reactions 1 Comments
3 min read
CWE-22: Path Traversal Vulnerabilities

CWE-22: Path Traversal Vulnerabilities

Comments
2 min read
The first step to build a secure application

The first step to build a secure application

Reactions 1 Comments
3 min read
CWE-79

CWE-79

Comments
3 min read
Securing The Future Through Stronger SAST

Securing The Future Through Stronger SAST

Comments
6 min read
What is Stored XSS?

What is Stored XSS?

Reactions 3 Comments
5 min read
CWE Top 25: 2020 v. 2021

CWE Top 25: 2020 v. 2021

Comments
3 min read
API Security 101: Injection

API Security 101: Injection

Reactions 3 Comments
6 min read
How Faulty Software Development Allows Ransomware to Thrive

How Faulty Software Development Allows Ransomware to Thrive

Reactions 1 Comments
7 min read
A Brief Introduction to CWEs

A Brief Introduction to CWEs

Comments
2 min read
API Security 101: Security Misconfiguration

API Security 101: Security Misconfiguration

Reactions 2 Comments
4 min read
Demystifying the 18 Checks for Secure Scorecards

Demystifying the 18 Checks for Secure Scorecards

Reactions 1 Comments
7 min read
API Security 101: Mass Assignment

API Security 101: Mass Assignment

Reactions 6 Comments
3 min read
An Optimisation Story: Building a Code Scanner for Large Golang Apps

An Optimisation Story: Building a Code Scanner for Large Golang Apps

Reactions 6 Comments
11 min read
Developer Challenge: SAST vs DAST vs SCA?

Developer Challenge: SAST vs DAST vs SCA?

Reactions 1 Comments
2 min read
API Security 101: Broken Function Level Authorization

API Security 101: Broken Function Level Authorization

Reactions 3 Comments
4 min read
The Software Bill of Materials and Software Development

The Software Bill of Materials and Software Development

Reactions 1 Comments
5 min read
The Battle Between Linters, Scanners, and Data Flow Analysis

The Battle Between Linters, Scanners, and Data Flow Analysis

Comments
5 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

Reactions 2 Comments
3 min read
API Security 101: Lack of Resources & Rate Limiting

API Security 101: Lack of Resources & Rate Limiting

Reactions 6 Comments
4 min read
test

test

Comments
1 min read
loading...