Forem

# appsec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security is Everybody's Job - Part 6 - The Second Way

Security is Everybody's Job - Part 6 - The Second Way

14
Comments
3 min read
Security is Everybody's Job - Part 5 - The First Way

Security is Everybody's Job - Part 5 - The First Way

6
Comments
4 min read
Security is Everybody's Job - Part 4 - What is DevSecOps?

Security is Everybody's Job - Part 4 - What is DevSecOps?

3
Comments
2 min read
Security is Everybody's Job - Part 3 - What IS DevOps?

Security is Everybody's Job - Part 3 - What IS DevOps?

16
Comments
2 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

12
Comments 1
2 min read
Using StackHawk in GitLab - Know Before You Go (Live)
Cover image for Using StackHawk in GitLab - Know Before You Go (Live)

Using StackHawk in GitLab - Know Before You Go (Live)

6
Comments
7 min read
AMA: DevSecOps versus Secure SDLC

AMA: DevSecOps versus Secure SDLC

8
Comments 2
1 min read
Security is Everybody's Job - Part 2 - What is application security?

Security is Everybody's Job - Part 2 - What is application security?

30
Comments 3
4 min read
Security is Everybody's Job - Part 1 - DevSecOps

Security is Everybody's Job - Part 1 - DevSecOps

55
Comments 2
3 min read
AMA AppSec: What would you tell University Students about Application Security?

AMA AppSec: What would you tell University Students about Application Security?

6
Comments
2 min read
Quick Security in VS Code with CodeSweep

Quick Security in VS Code with CodeSweep

2
Comments
2 min read
Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Ryan Lockard Names the Seven Deadly Sins of DevSecOps

2
Comments
1 min read
AppSec: Some testing technique explained DAST, SAST, IAST, OSA/SCA

AppSec: Some testing technique explained DAST, SAST, IAST, OSA/SCA

6
Comments 1
7 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

3
Comments
1 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

9
Comments
7 min read
The Importance of Inventory

The Importance of Inventory

5
Comments
6 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

11
Comments
2 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

49
Comments 2
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

18
Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

17
Comments
1 min read
Pushing Left, Like a Boss — Part 5.13 — HTTPS only

Pushing Left, Like a Boss — Part 5.13 — HTTPS only

18
Comments
1 min read
Security Champion

Security Champion

7
Comments
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Developers need to stop fearing the InfoSec Mafia
Cover image for Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

29
Comments 4
4 min read
loading...