DEV Community

# appsec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Como identificar vulnerabilidades no código fonte?

Como identificar vulnerabilidades no código fonte?

23
Comments 3
8 min read
Dicas de codificação segura em C#

Dicas de codificação segura em C#

23
Comments 3
9 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

16
Comments 3
2 min read
O que vem depois do Pentesting?

O que vem depois do Pentesting?

12
Comments
13 min read
Threads of the Next Wave of DevOps

Threads of the Next Wave of DevOps

9
Comments
7 min read
Pensando sobre Cultura de AppSec

Pensando sobre Cultura de AppSec

8
Comments 1
3 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

5
Comments
3 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

4
Comments
2 min read
VMClarity: Virtual Machine Security

VMClarity: Virtual Machine Security

4
Comments 1
2 min read
Building security for digital wallets and financial applications

Building security for digital wallets and financial applications

2
Comments
2 min read
Mastering Application Security: The Power of Rate Limiting

Mastering Application Security: The Power of Rate Limiting

2
Comments
6 min read
Creating a DevSecOps pipeline with Jenkins — Part 1

Creating a DevSecOps pipeline with Jenkins — Part 1

1
Comments
12 min read
Criando meu próprio Github Actions para a área de AppSec

Criando meu próprio Github Actions para a área de AppSec

1
Comments
3 min read
VMClarity: What Happens During a Scan?

VMClarity: What Happens During a Scan?

1
Comments
2 min read
Mitigate the hidden security risks of open source software libraries

Mitigate the hidden security risks of open source software libraries

1
Comments 1
9 min read
Como realizar uma análise dinâmica (DAST) com a Veracode em aplicações não publicadas?

Como realizar uma análise dinâmica (DAST) com a Veracode em aplicações não publicadas?

1
Comments
2 min read
Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
How to Close Deals Faster with a Security Assessment Report

How to Close Deals Faster with a Security Assessment Report

1
Comments
4 min read
DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

1
Comments
14 min read
Next.js: Crafting a Strict CSP

Next.js: Crafting a Strict CSP

1
Comments
4 min read
Fun Infosec Writeups from GH

Fun Infosec Writeups from GH

Comments
3 min read
5 tips to help you secure your Kubernetes deployments

5 tips to help you secure your Kubernetes deployments

Comments
2 min read
How to Evaluate a Static Application Security Testing (SAST) Solution

How to Evaluate a Static Application Security Testing (SAST) Solution

Comments
7 min read
Interesting Software Vulns

Interesting Software Vulns

Comments
3 min read
Tips for Using CloudFlare

Tips for Using CloudFlare

Comments
3 min read
Less Common Web Vulnerabilities

Less Common Web Vulnerabilities

Comments
3 min read
Security - A brief introduction to application security

Security - A brief introduction to application security

Comments
2 min read
Deploying Then Securing the OWASP Juice Shop, Part Six of ?

Deploying Then Securing the OWASP Juice Shop, Part Six of ?

Comments
27 min read
What are the top 10 vulnerabilities for web application?

What are the top 10 vulnerabilities for web application?

Comments 1
2 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
DAST in 5 Minutes (Or Less): What You Need to Know

DAST in 5 Minutes (Or Less): What You Need to Know

Comments
3 min read
Deploying Then Securing the OWASP Juice Shop, Part One of ?

Deploying Then Securing the OWASP Juice Shop, Part One of ?

Comments
5 min read
Mitigation For Root Detection bypass via Hide My Applist ?

Mitigation For Root Detection bypass via Hide My Applist ?

Comments
1 min read
loading...