Forem

# applicationsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Looking back at Black Hat USA 2022

Looking back at Black Hat USA 2022

Comments
5 min read
Avoiding SMTP Injection: A Whitebox primer

Avoiding SMTP Injection: A Whitebox primer

Comments
7 min read
Using Kubernetes ConfigMaps securely

Using Kubernetes ConfigMaps securely

Comments
7 min read
Best practices for API gateway security

Best practices for API gateway security

Comments
6 min read
How to find and fix XML entity vulnerabilities

How to find and fix XML entity vulnerabilities

Comments
9 min read
Solve Hack the Box and other CTF challenges with Snyk

Solve Hack the Box and other CTF challenges with Snyk

1
Comments
8 min read
Best practices for containerizing .net applications

Best practices for containerizing .net applications

2
Comments
9 min read
Best practices for container isolation

Best practices for container isolation

2
Comments
7 min read
Applying the principle of least privilege to Kubernetes using RBAC

Applying the principle of least privilege to Kubernetes using RBAC

Comments 1
7 min read
Best practices for managing Java dependencies
Cover image for Best practices for managing Java dependencies

Best practices for managing Java dependencies

3
Comments
8 min read
A definitive guide to Ruby gems dependency management

A definitive guide to Ruby gems dependency management

2
Comments
11 min read
Detecting log4j using ShiftLeft CORE

Detecting log4j using ShiftLeft CORE

6
Comments
2 min read
Best Practices for Application Security in the Cloud

Best Practices for Application Security in the Cloud

2
Comments
8 min read
Mobile Security: OWASP List

Mobile Security: OWASP List

3
Comments
3 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

17
Comments
2 min read
Application Security Best Practices / Defensive Programming
Cover image for Application Security Best Practices / Defensive Programming

Application Security Best Practices / Defensive Programming

21
Comments
12 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

22
Comments
4 min read
All about SIEM

All about SIEM

3
Comments
2 min read
Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Ryan Lockard Names the Seven Deadly Sins of DevSecOps

2
Comments
1 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

3
Comments
1 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

49
Comments 2
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

18
Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

17
Comments
1 min read
Developers need to stop fearing the InfoSec Mafia
Cover image for Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

11
Comments 1
1 min read
loading...