Forem

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Modelagem de Ameaças -Decompondo o Aplicativo
Cover image for Modelagem de Ameaças -Decompondo o Aplicativo

Modelagem de Ameaças -Decompondo o Aplicativo

2
Comments
7 min read
Terminologias Utilizadas em Modelagem de Ameaças
Cover image for Terminologias Utilizadas em Modelagem de Ameaças

Terminologias Utilizadas em Modelagem de Ameaças

2
Comments
4 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

10
Comments
5 min read
GitHub: How To Enable Code Scanning With Semgrep

GitHub: How To Enable Code Scanning With Semgrep

5
Comments
3 min read
open-appsec NGINX WAF makes machine learning friendly using gamification

open-appsec NGINX WAF makes machine learning friendly using gamification

4
Comments
2 min read
How to Automate OWASP ZAP
Cover image for How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
Subscribe to a new newsletter for security-aware developers!
Cover image for Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
What is Minimum Viable Security (MVS) and how does it improve the life of developers?
Cover image for What is Minimum Viable Security (MVS) and how does it improve the life of developers?

What is Minimum Viable Security (MVS) and how does it improve the life of developers?

6
Comments 1
6 min read
Encryption in ⛅ cloud native apps
Cover image for Encryption in ⛅ cloud native apps

Encryption in ⛅ cloud native apps

12
Comments
3 min read
Network Traffic Observability: Three PacketStreamer Use Cases

Network Traffic Observability: Three PacketStreamer Use Cases

5
Comments
3 min read
Doing DevSecOps without constant CI/CD changes
Cover image for Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

4
Comments
5 min read
How to Approach DevSecOps Security Automation
Cover image for How to Approach DevSecOps Security Automation

How to Approach DevSecOps Security Automation

5
Comments
5 min read
2 free data security tools every dev should know (and use)
Cover image for 2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

13
Comments 3
2 min read
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
Cover image for ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More

7
Comments
5 min read
Spring Boot: Prevent Log Injection Attacks With Logback

Spring Boot: Prevent Log Injection Attacks With Logback

5
Comments
4 min read
Exploring 🚩🚩🚩red flags in React Native security libraries
Cover image for Exploring 🚩🚩🚩red flags in React Native security libraries

Exploring 🚩🚩🚩red flags in React Native security libraries

5
Comments
2 min read
How to build a secure crypto wallet
Cover image for How to build a secure crypto wallet

How to build a secure crypto wallet

9
Comments 5
1 min read
Authentication bypass in cryptography library

Authentication bypass in cryptography library

5
Comments
3 min read
Secure by default, unsafe by you

Secure by default, unsafe by you

14
Comments
2 min read
Security by incident and surprise

Security by incident and surprise

5
Comments
4 min read
Corona Virus Threat Modelling

Corona Virus Threat Modelling

2
Comments
4 min read
Angular Security - Disable Inline Critical CSS

Angular Security - Disable Inline Critical CSS

5
Comments 2
2 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Codecov supply chain attack - Step by step breakdown
Cover image for Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

7
Comments
7 min read
loading...