Security
-
Software Development
Why You Should Encrypt ALL Personally Identifiable Information (PII)
Many critics have pointed out that Ashley Madison should have encrypted all personally identifiable information (PII). The database contained sensitive…
Read More » -
Software Development
Top 10 Lists for Designing and Writing Secure and Safe Software
If you care about writing secure code, should know all about these Top 10 lists: OWASP Top 10 The OWASP…
Read More » -
Software Development
Implementing Client-Side Row-Level Security with jOOQ
Some time ago, we’ve promised to follow up on our Constraints on Views article with a sequel showing how to…
Read More » -
Software Development
How to Keep REST API Credentials Secure
If you are building mobile apps then you are connecting to some REST API. For example, if you want to…
Read More » -
Core Java
9 Security mistakes every Java Developer must avoid
Checkmarx CxSAST is a powerful Source Code Analysis (SCA) solution designed for identifying, tracking and fixing technical and logical security…
Read More » -
DevOps
Can DevOps(Sec) make Software more Secure?
There was a lot of talk at RSA this year about DevOps and security: DevOpsSec or DevSecOps or Rugged DevOps…
Read More » -
Software Development
Backdoors, Sabotage or Just Plain Stupidity
Someone on your development team, or a contractor or a consultant, or one of your sys admins, or a bad…
Read More » -
Software Development
5 simple rules for securely storing passwords
Far too frequently, systems are hacked and their user databases are compromised. And there are far too many cases where…
Read More » -
Software Development
Authentication Mechanisms for Web Applications
Authentication is the basic requirement for most of websites. However, there are many mechanisms to implement authentication and they are…
Read More »