Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud Vickie Li Vickie Li Vickie Li Follow for ShiftLeft Apr 4 '22 Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud #applicationdevelopme #cybersecurity #softwaredevelopment #hacking Add Comment 4 min read
Secure Software Summit: The State of OSS Supply Chain Security Vickie Li Vickie Li Vickie Li Follow for ShiftLeft Mar 24 '22 Secure Software Summit: The State of OSS Supply Chain Security #softwaredevelopment #applicationdevelopme #hacking #cybersecurity 1 reaction Add Comment 7 min read
Key Considerations When Choosing a SAST Vickie Li Vickie Li Vickie Li Follow for ShiftLeft Jan 4 '22 Key Considerations When Choosing a SAST #applicationdevelopme #applicationsecurity #softwaredevelopment #cybersecurity Add Comment 10 min read
API Security 101: Insufficient Logging and Monitoring Cdebrincat Cdebrincat Cdebrincat Follow for ShiftLeft Oct 19 '21 API Security 101: Insufficient Logging and Monitoring #softwaredevelopment #applicationdevelopme #apidevelopment #api Add Comment 3 min read
Performance Optimization Techniques anjireddy k anjireddy k anjireddy k Follow Aug 24 '20 Performance Optimization Techniques #performance #applicationdevelopme #applicationdesign #performanceoptimizat Add Comment 5 min read
Performance Optimization Considerations for an Enterprise Application anjireddy k anjireddy k anjireddy k Follow Aug 24 '20 Performance Optimization Considerations for an Enterprise Application #architecture #performanceoptimizat #applicationdevelopme #applicationdesign Add Comment 5 min read