DEV Community

Vickie Li profile picture

Vickie Li

404 bio not found

Joined Joined on  twitter website
A guide to the OWASP API top ten

A guide to the OWASP API top ten

Reactions 6 Comments
7 min read
How to Prevent Supply Chain Attacks by Securing DevOps

How to Prevent Supply Chain Attacks by Securing DevOps

Reactions 1 Comments
6 min read
XStream Vulnerabilities — Detection & Mitigation

XStream Vulnerabilities — Detection & Mitigation

Comments
4 min read
API Security 101: Excessive Data Exposure

API Security 101: Excessive Data Exposure

Reactions 1 Comments
4 min read
Connecting RaaS, REvil, Kaseya and your security posture

Connecting RaaS, REvil, Kaseya and your security posture

Comments
7 min read
Main Branch #5

Main Branch #5

Comments
1 min read
SAST vs. DAST vs. SCA: A Comparison

SAST vs. DAST vs. SCA: A Comparison

Reactions 1 Comments
4 min read
API Security 101: Broken User Authentication

API Security 101: Broken User Authentication

Comments
4 min read
API Security 101: Broken Object Level Authorization

API Security 101: Broken Object Level Authorization

Comments
4 min read
Main Branch #3

Main Branch #3

Comments
1 min read
Why Your Code Is A Graph

Why Your Code Is A Graph

Reactions 4 Comments
6 min read
Main Branch #2

Main Branch #2

Comments
1 min read
AppSec Conference: Shifting Left 2.0

AppSec Conference: Shifting Left 2.0

Comments
3 min read
Beating the OWASP Benchmark with Alok Shukla

Beating the OWASP Benchmark with Alok Shukla

Comments
1 min read
Main Branch #01

Main Branch #01

Comments
1 min read
Static Analysis of Python Applications

Static Analysis of Python Applications

Comments
2 min read
Closing the Developer Security Skills Gap

Closing the Developer Security Skills Gap

Comments
3 min read
Beating the OWASP Benchmark

Beating the OWASP Benchmark

Reactions 1 Comments
7 min read
Introducing “Attacker Reachability”: Reduce open-source vulnerability tickets by 90% or more.

Introducing “Attacker Reachability”: Reduce open-source vulnerability tickets by 90% or more.

Comments
6 min read
Announcing ShiftLeft CORE — A Code Security Platform

Announcing ShiftLeft CORE — A Code Security Platform

Comments
3 min read
Detecting Sensitive Data Leaks That Matter

Detecting Sensitive Data Leaks That Matter

Comments
6 min read
How to Start Tracking Your Application Dependencies

How to Start Tracking Your Application Dependencies

Comments
2 min read
Scanning for Secrets in Source Code

Scanning for Secrets in Source Code

Reactions 4 Comments
4 min read
How To Review Code For Vulnerabilities

How To Review Code For Vulnerabilities

Reactions 1 Comments
4 min read
loading...