Forem

# appsec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

17
Comments 3
2 min read
DAST in 5 Minutes (Or Less): What You Need to Know

DAST in 5 Minutes (Or Less): What You Need to Know

Comments
3 min read
Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
Mitigate the hidden security risks of open source software libraries

Mitigate the hidden security risks of open source software libraries

1
Comments 1
9 min read
Criando meu próprio Github Actions para a área de AppSec

Criando meu próprio Github Actions para a área de AppSec

1
Comments
3 min read
VMClarity: What Happens During a Scan?

VMClarity: What Happens During a Scan?

1
Comments
2 min read
VMClarity: Virtual Machine Security

VMClarity: Virtual Machine Security

4
Comments 1
2 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

6
Comments
2 min read
How to scan your ruby or JS project for security improvements, for free.

How to scan your ruby or JS project for security improvements, for free.

2
Comments
3 min read
What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

3
Comments
6 min read
Os diferentes modos de se realizar SAST com a Veracode

Os diferentes modos de se realizar SAST com a Veracode

3
Comments
4 min read
Modelagem de Ameaças -Decompondo o Aplicativo

Modelagem de Ameaças -Decompondo o Aplicativo

2
Comments
7 min read
Terminologias Utilizadas em Modelagem de Ameaças

Terminologias Utilizadas em Modelagem de Ameaças

2
Comments
4 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
Modelagem de Ameaças - Introdução

Modelagem de Ameaças - Introdução

2
Comments
3 min read
Princípios de Segurança Cibernética

Princípios de Segurança Cibernética

2
Comments
7 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

10
Comments
5 min read
GitHub: How To Enable Code Scanning With Semgrep

GitHub: How To Enable Code Scanning With Semgrep

5
Comments
3 min read
open-appsec NGINX WAF makes machine learning friendly using gamification

open-appsec NGINX WAF makes machine learning friendly using gamification

4
Comments
2 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
What is Minimum Viable Security (MVS) and how does it improve the life of developers?

What is Minimum Viable Security (MVS) and how does it improve the life of developers?

6
Comments 1
6 min read
Encryption in â›… cloud native apps

Encryption in â›… cloud native apps

12
Comments
3 min read
Network Traffic Observability: Three PacketStreamer Use Cases

Network Traffic Observability: Three PacketStreamer Use Cases

5
Comments
3 min read
Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

4
Comments
5 min read
loading...