DEV Community

# appsec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Security is Everybody's Job - Part 1 - DevSecOps

Security is Everybody's Job - Part 1 - DevSecOps

55
Comments 2
3 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

49
Comments 2
1 min read
Security is Everybody's Job - Part 2 - What is application security?

Security is Everybody's Job - Part 2 - What is application security?

30
Comments 3
4 min read
Como identificar vulnerabilidades no cĂłdigo fonte?

Como identificar vulnerabilidades no cĂłdigo fonte?

23
Comments 3
8 min read
Dicas de codificação segura em C#

Dicas de codificação segura em C#

23
Comments 3
9 min read
Pushing Left, Like a Boss — Part 5.13 — HTTPS only

Pushing Left, Like a Boss — Part 5.13 — HTTPS only

18
Comments
1 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

18
Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

17
Comments
1 min read
Security is Everybody's Job - Part 3 - What IS DevOps?

Security is Everybody's Job - Part 3 - What IS DevOps?

16
Comments
2 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

16
Comments 3
2 min read
Publishing an obfuscated kotlin library

Publishing an obfuscated kotlin library

14
Comments
6 min read
Secure by default, unsafe by you

Secure by default, unsafe by you

14
Comments
2 min read
Security is Everybody's Job - Part 6 - The Second Way

Security is Everybody's Job - Part 6 - The Second Way

14
Comments
3 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

13
Comments 3
2 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

12
Comments 1
2 min read
O que vem depois do Pentesting?

O que vem depois do Pentesting?

12
Comments
13 min read
Encryption in â›… cloud native apps

Encryption in â›… cloud native apps

11
Comments
3 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

11
Comments
2 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

10
Comments
6 min read
Threads of the Next Wave of DevOps

Threads of the Next Wave of DevOps

9
Comments
7 min read
How to build a secure crypto wallet

How to build a secure crypto wallet

9
Comments 3
1 min read
Pensando sobre Cultura de AppSec

Pensando sobre Cultura de AppSec

8
Comments 1
3 min read
Scanning the Damn Vulnerable Web App with StackHawk

Scanning the Damn Vulnerable Web App with StackHawk

8
Comments
10 min read
AMA: DevSecOps versus Secure SDLC

AMA: DevSecOps versus Secure SDLC

8
Comments 2
1 min read
What do appsec and fire extinguishers have in common?

What do appsec and fire extinguishers have in common?

8
Comments
3 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

8
Comments
7 min read
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

7
Comments
5 min read
Security Champion

Security Champion

7
Comments
2 min read
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

7
Comments
7 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

6
Comments 1
8 min read
What is Minimum Viable Security (MVS) and how does it improve the life of developers?

What is Minimum Viable Security (MVS) and how does it improve the life of developers?

6
Comments 1
6 min read
Security is Everybody's Job - Part 5 - The First Way

Security is Everybody's Job - Part 5 - The First Way

6
Comments
4 min read
Using StackHawk in GitLab - Know Before You Go (Live)

Using StackHawk in GitLab - Know Before You Go (Live)

6
Comments
7 min read
AMA AppSec: What would you tell University Students about Application Security?

AMA AppSec: What would you tell University Students about Application Security?

6
Comments
2 min read
One Year Anniversary of We Hack Purple

One Year Anniversary of We Hack Purple

5
Comments
4 min read
Exploring đźš©đźš©đźš©red flags in React Native security libraries

Exploring đźš©đźš©đźš©red flags in React Native security libraries

5
Comments
2 min read
Network Traffic Observability: Three PacketStreamer Use Cases

Network Traffic Observability: Three PacketStreamer Use Cases

5
Comments
3 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

5
Comments
3 min read
Security by incident and surprise

Security by incident and surprise

5
Comments
4 min read
The Importance of Inventory

The Importance of Inventory

5
Comments
6 min read
Authentication bypass in cryptography library

Authentication bypass in cryptography library

5
Comments
3 min read
Spring Boot: Prevent Log Injection Attacks With Logback

Spring Boot: Prevent Log Injection Attacks With Logback

5
Comments
4 min read
Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

5
Comments
7 min read
Angular Security - Disable Inline Critical CSS

Angular Security - Disable Inline Critical CSS

5
Comments 2
2 min read
How to Approach DevSecOps Security Automation

How to Approach DevSecOps Security Automation

5
Comments
5 min read
Hacking the SDLC: Win the Minds of your Developers

Hacking the SDLC: Win the Minds of your Developers

5
Comments
4 min read
GitHub: How To Enable Code Scanning With Semgrep

GitHub: How To Enable Code Scanning With Semgrep

5
Comments
3 min read
Alice and Bob Learn: Chapter Discussions

Alice and Bob Learn: Chapter Discussions

5
Comments
2 min read
AppSec: Some testing technique explained DAST, SAST, IAST, OSA/SCA

AppSec: Some testing technique explained DAST, SAST, IAST, OSA/SCA

5
Comments 1
7 min read
VMClarity: Virtual Machine Security

VMClarity: Virtual Machine Security

4
Comments 1
2 min read
Breaking and building encryption in NFC digital wallets đź“ł

Breaking and building encryption in NFC digital wallets đź“ł

4
Comments
2 min read
How to get your boss to approve the training you want

How to get your boss to approve the training you want

4
Comments
4 min read
open-appsec NGINX WAF makes machine learning friendly using gamification

open-appsec NGINX WAF makes machine learning friendly using gamification

4
Comments
2 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

4
Comments
5 min read
Conhecendo a OWASP

Conhecendo a OWASP

3
Comments
3 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

3
Comments
5 min read
loading...