Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification

Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification

Discover how proper secure coding practices can prevent costly data breaches and vulnerabilities. This comprehensive guide covers essential security principles, OWASP Top 10 mitigations, and language-specific techniques that every developer needs to ...
Analyzing the Samsung Hack - Thousands of credentials / secrets exposed

Removing Secrets From Your Source Code

| | Breach, Coding, security
This article explains how to keep your software repositories free of passwords, tokens, and private keys. The post Removing Secrets From Your Source Code appeared first on Rainbow and Unicorn ...
Automate Your Home Lab on the Oracle Cloud

Automate Your Home Lab on the Oracle Cloud

| | api, Coding, DEVOPS, Oracle
Deploy your home lab and max out the free tier on the Oracle Cloud with the Terraform automation tool. Oracle Cloud Infrastructure (OCI) is a public cloud platform offering a generous amount ...
The first step to build a secure application

The first step to build a secure application

What every developer should do before they start writing codePhoto by Alexander Dummer on UnsplashI talk a lot about finding and fixing vulnerabilities on my blog. But what can you do to prevent vulnerabilities ...
Cyber Security Education Is More Important Than Ever

Cyber Security Education Is More Important Than Ever

Security is a field that is seeing exponential growth, primarily because it parallels technology’s exponential growth. Companies and individuals who can embrace this will have an edge.Let Us Advocate for Security EducationHere are ...
Why Your Code Is A Graph

Why Your Code Is A Graph

Graph structures and how they are used in security code analysisGraphs structures are a natural representation of many kinds of data. They are a good way to represent relationships between objects, such as ...

Everything You Need to Know About CI/CD and Security

CI/CD is a recommended technique for DevOps teams and a best practice in agile methodology. CI/CD is a method for consistently delivering apps to clients by automating the app development phases. Continuous ...
New Radicals - You Get What You Give (Official Music Video)

Shine Theory / DevOps / Community

A podcast called The Allusionist (hosted by Helen Zaltzman) crossed my path that provided me with a light-bulb moment. The podcast focuses on language and etymology. This particular episode contextualised that focus ...
Chris Rock Stand Up "Job v. Career"

Staying Relevant in a Technology World! – Editorial

“Once a new technology rolls over you, if you’re not part of the steamroller, you’re part of the road.” –Stewart Brand This is one of those podcasts which isn’t the offspring of ...
Family Guy - Cobra

Hacking Hackers and their Hacks (2018)

Hacking! Is it cast aside teenage wunderkinds who can seemingly dissect all things computer with the crack of a laptop to create designer chaos? They are portrayed smoking cigarettes, roller blading and ...