Coding

Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification
Discover how proper secure coding practices can prevent costly data breaches and vulnerabilities. This comprehensive guide covers essential security principles, OWASP Top 10 mitigations, and language-specific techniques that every developer needs to ...

Removing Secrets From Your Source Code
This article explains how to keep your software repositories free of passwords, tokens, and private keys. The post Removing Secrets From Your Source Code appeared first on Rainbow and Unicorn ...

Automate Your Home Lab on the Oracle Cloud
Deploy your home lab and max out the free tier on the Oracle Cloud with the Terraform automation tool. Oracle Cloud Infrastructure (OCI) is a public cloud platform offering a generous amount ...

The first step to build a secure application
What every developer should do before they start writing codePhoto by Alexander Dummer on UnsplashI talk a lot about finding and fixing vulnerabilities on my blog. But what can you do to prevent vulnerabilities ...

Cyber Security Education Is More Important Than Ever
Security is a field that is seeing exponential growth, primarily because it parallels technology’s exponential growth. Companies and individuals who can embrace this will have an edge.Let Us Advocate for Security EducationHere are ...

Why Your Code Is A Graph
Graph structures and how they are used in security code analysisGraphs structures are a natural representation of many kinds of data. They are a good way to represent relationships between objects, such as ...
Everything You Need to Know About CI/CD and Security
CI/CD is a recommended technique for DevOps teams and a best practice in agile methodology. CI/CD is a method for consistently delivering apps to clients by automating the app development phases. Continuous ...

Shine Theory / DevOps / Community
A podcast called The Allusionist (hosted by Helen Zaltzman) crossed my path that provided me with a light-bulb moment. The podcast focuses on language and etymology. This particular episode contextualised that focus ...

Staying Relevant in a Technology World! – Editorial
“Once a new technology rolls over you, if you’re not part of the steamroller, you’re part of the road.” –Stewart Brand This is one of those podcasts which isn’t the offspring of ...

Hacking Hackers and their Hacks (2018)
Hacking! Is it cast aside teenage wunderkinds who can seemingly dissect all things computer with the crack of a laptop to create designer chaos? They are portrayed smoking cigarettes, roller blading and ...