DEV Community

Cdebrincat profile picture

Cdebrincat

404 bio not found

Joined Joined on  github website
HIPAA Compliance for Healthcare Apps

HIPAA Compliance for Healthcare Apps

1
Comments
4 min read
What to do about CWEs in your application

What to do about CWEs in your application

1
Comments
3 min read
OWASP Updates the Top 10 Web Application Security Risks

OWASP Updates the Top 10 Web Application Security Risks

2
Comments
6 min read
Evolving Threat series — Infiltrating NPM’s Supply Chain (UA-Parser-js)

Evolving Threat series — Infiltrating NPM’s Supply Chain (UA-Parser-js)

3
Comments
4 min read
CWE-77

CWE-77

Comments
2 min read
What happened in the Twitch Breach…

What happened in the Twitch Breach…

1
Comments
5 min read
CWE-918

CWE-918

Comments
2 min read
Finding Sensitive Data Leaks In Code Using ShiftLeft CORE

Finding Sensitive Data Leaks In Code Using ShiftLeft CORE

1
Comments
6 min read
CWE-200

CWE-200

Comments
2 min read
API Security 101: Insufficient Logging and Monitoring

API Security 101: Insufficient Logging and Monitoring

Comments
3 min read
CWE-89

CWE-89

Comments
2 min read
CWE-78

CWE-78

Comments
2 min read
CWE-611

CWE-611

Comments
2 min read
API Security 101: Improper Assets Management

API Security 101: Improper Assets Management

1
Comments
3 min read
CWE-22: Path Traversal Vulnerabilities

CWE-22: Path Traversal Vulnerabilities

Comments
2 min read
The first step to build a secure application

The first step to build a secure application

1
Comments
3 min read
CWE-79

CWE-79

Comments
3 min read
Securing The Future Through Stronger SAST

Securing The Future Through Stronger SAST

Comments
6 min read
What is Stored XSS?

What is Stored XSS?

3
Comments
5 min read
CWE Top 25: 2020 v. 2021

CWE Top 25: 2020 v. 2021

Comments
3 min read
API Security 101: Injection

API Security 101: Injection

3
Comments
6 min read
How Faulty Software Development Allows Ransomware to Thrive

How Faulty Software Development Allows Ransomware to Thrive

Comments
7 min read
A Brief Introduction to CWEs

A Brief Introduction to CWEs

Comments
2 min read
API Security 101: Security Misconfiguration

API Security 101: Security Misconfiguration

1
Comments
4 min read
Demystifying the 18 Checks for Secure Scorecards

Demystifying the 18 Checks for Secure Scorecards

1
Comments
7 min read
API Security 101: Mass Assignment

API Security 101: Mass Assignment

6
Comments
3 min read
An Optimisation Story: Building a Code Scanner for Large Golang Apps

An Optimisation Story: Building a Code Scanner for Large Golang Apps

6
Comments
11 min read
Developer Challenge: SAST vs DAST vs SCA?

Developer Challenge: SAST vs DAST vs SCA?

1
Comments
2 min read
API Security 101: Broken Function Level Authorization

API Security 101: Broken Function Level Authorization

3
Comments
4 min read
The Software Bill of Materials and Software Development

The Software Bill of Materials and Software Development

1
Comments
5 min read
The Battle Between Linters, Scanners, and Data Flow Analysis

The Battle Between Linters, Scanners, and Data Flow Analysis

Comments
5 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
API Security 101: Lack of Resources & Rate Limiting

API Security 101: Lack of Resources & Rate Limiting

6
Comments
4 min read
test

test

Comments
1 min read
loading...