programming

Exploring Rust language adoption
The Rust programming language has rapidly emerged from its niche origins to become a widely embraced programming language, with over four million developers adopting it globally ...

Dotnet Source Generators in 2024 Part 1: Getting Started
IntroductionIn this blog post, we will cover the basics of a source generator, the major types involved, some common issues you might encounter, how to properly log those issues, and how to ...

Why Devs Aren’t Responsible for Non-Human Credential Hygiene
3 min read Security teams can enhance business operations by providing workload credential management as a service, freeing developers to focus on innovation. The post Why Devs Aren’t Responsible for Non-Human Credential ...

Optimizing CI/CD Security: Best Practices for a Robust Software Delivery Pipeline
5 min read Modern software development accelerates progress but introduces security risks that must be managed to protect organizational integrity and reputation. The post Optimizing CI/CD Security: Best Practices for a Robust ...

Securing CI/CD Pipelines: The Role of Workload Identity Federation
3 min read By introducing vulnerabilities, long-lived credentials can erase the rapid, iterative improvements automated software processes are designed to deliver. The post Securing CI/CD Pipelines: The Role of Workload Identity Federation ...
Get A Day’s Schedule From Fantastical On The Command Line With Shortcuts
I use Fantastical as it’s a much cleaner and native interface than Google Calendar, which I’m stuck using. I do like to use the command line more than GUIs and, while I ...

The State of Application Security with Tanya Janca
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current ...

Malware Evolves to Present New Threats to Developers
Malware, or code written for malicious purposes, is evolving.Photo by Cécile Brasseur on UnsplashSoftware developers face new threats from malicious code as their tools and processes have proven to be an effective and ...

What is insecure deserialization?
Getting to know a critical vulnerability that affects Java, Python, and other common programming languages.Photo by Jiawei Zhao on UnsplashAs a penetration tester, there are few vulnerabilities that fascinate me more than insecure ...

OWASP Updates the Top 10 Web Application Security Risks
OWASP Top Ten updates: what changed?OWASP updates the top 10 web application security risksPhoto by Scott Graham on UnsplashThe Open Web Application Security Project, or OWASP, is a non-profit organization dedicated to improving software security ...