Exploring Rust language adoption

Exploring Rust language adoption

The Rust programming language has rapidly emerged from its niche origins to become a widely embraced programming language, with over four million developers adopting it globally ...
Dotnet Source Generators in 2024 Part 1: Getting Started

Dotnet Source Generators in 2024 Part 1: Getting Started

IntroductionIn this blog post, we will cover the basics of a source generator, the major types involved, some common issues you might encounter, how to properly log those issues, and how to ...
Discover Aembit banner

Why Devs Aren’t Responsible for Non-Human Credential Hygiene

3 min read Security teams can enhance business operations by providing workload credential management as a service, freeing developers to focus on innovation. The post Why Devs Aren’t Responsible for Non-Human Credential ...
🔨

Optimizing CI/CD Security: Best Practices for a Robust Software Delivery Pipeline

5 min read Modern software development accelerates progress but introduces security risks that must be managed to protect organizational integrity and reputation. The post Optimizing CI/CD Security: Best Practices for a Robust ...
Aembit logo

Securing CI/CD Pipelines: The Role of Workload Identity Federation

3 min read By introducing vulnerabilities, long-lived credentials can erase the rapid, iterative improvements automated software processes are designed to deliver. The post Securing CI/CD Pipelines: The Role of Workload Identity Federation ...

Get A Day’s Schedule From Fantastical On The Command Line With Shortcuts

| | macos, programming
I use Fantastical as it’s a much cleaner and native interface than Google Calendar, which I’m stuck using. I do like to use the command line more than GUIs and, while I ...
The State of Application Security with Tanya Janca

The State of Application Security with Tanya Janca

Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current ...
Malware Evolves to Present New Threats to Developers

Malware Evolves to Present New Threats to Developers

Malware, or code written for malicious purposes, is evolving.Photo by Cécile Brasseur on UnsplashSoftware developers face new threats from malicious code as their tools and processes have proven to be an effective and ...
What is insecure deserialization?

What is insecure deserialization?

Getting to know a critical vulnerability that affects Java, Python, and other common programming languages.Photo by Jiawei Zhao on UnsplashAs a penetration tester, there are few vulnerabilities that fascinate me more than insecure ...
OWASP Updates the Top 10 Web Application Security Risks

OWASP Updates the Top 10 Web Application Security Risks

OWASP Top Ten updates: what changed?OWASP updates the top 10 web application security risksPhoto by Scott Graham on UnsplashThe Open Web Application Security Project, or OWASP, is a non-profit organization dedicated to improving software security ...