developer
Your Codebase is a Cluttered Garage Full of Dead Code
Over time unused code becomes clutter as teams refactor. Shouldn't Java developers have an easier way to identify dead code for removal? The post Your Codebase is a Cluttered Garage Full of ...
Why Are APIs so Easy for Threat Actors to Exploit?
Lax API security creates the perfect window of opportunity, often with a low barrier to entry. Cybercriminals are eager to exploit it ...
Code Inventory: Remove Dead Code for Easier Maintenance
Azul Code Inventory centralizes pinpoints code that doesn’t run in production and provides a treasure map of dead code that you can remove. The post Code Inventory: Remove Dead Code for Easier ...
Take the Pain Out of Your Customers’ Code Maintenance with Azul Code Inventory
Code maintenance is never prioritized. If you’re a provider of Java software developer services, your customers need a solution to dead code. The post Take the Pain Out of Your Customers’ Code ...
Malware Devs Update Legion Hacktool, Boost Capabilities
A recently discovered cloud-focused malware tool has seemingly been updated with additional functionality ...
New Design, New Features: Maven Central Improvements for Developers
Maven Central Repository has made the biggest change to its platform since its inception.Hosted by Sonatype, Maven Central Repository is one of the largest Java repositories in the world. It has helped ...
SLSA and Developer Productivity Meet in 2023
As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life cycle (SDLC). However, most organizations cannot afford to have their security measures negatively ...
The State of Application Security with Tanya Janca
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current ...
Hacking and Securing Python Applications
27 vulnerabilities to look out for in Python applications: Arbitrary file writes, directory traversal, deserialization, and more…Photo by Hitesh Choudhary on UnsplashSecuring applications is not the easiest thing to do. An application has many ...
What Developers Need to Know About the Impact of Compliance Frameworks on Software Development
DeepFactor's brand-new compliance module helps developers identify when vulnerabilities and security risk jeopardize compliance goals For today’s digital businesses, protecting customer data should be a top priority. However, as product teams focus ...