maveraw.hashnode.devMy Journey into Developing Secure Software: What I Wish I Knew EarlierMy Journey into Developing Secure Software: What I Wish I Knew Earlier Introduction: How It All Started Have you ever come across something during your learning journey that makes you stop and ask, “Wait… how secure is this?” That was me when I start...Feb 10, 2025·4 min read
maveraw.hashnode.devStep-by-Step Guide to Secure CI/CD PipelinesIn today’s fast-paced DevOps world, continuous integration and continuous delivery/deployment (CI/CD) pipelines help teams deliver software faster. But speed without security can leave your applications vulnerable to attacks. This guide will walk you...Feb 7, 2025·4 min read
maveraw.hashnode.devSBOM: The Key to Secure Software Supply ChainsIntroduction With the rise of supply chain attacks, ensuring software security has become more critical than ever. One of the most effective ways to achieve this is through a Software Bill of Materials (SBOM). An SBOM provides a comprehensive invento...Feb 4, 2025·4 min read
maveraw.hashnode.devCommon Security Pitfalls in Open-Source Development & How to Avoid ThemIntroduction Open-source software (OSS) is the backbone of modern development, but it also introduces security risks if not managed properly. Developers often overlook crucial security best practices, leading to vulnerabilities that can be exploited....Feb 4, 2025·5 min read
maveraw.hashnode.dev10 Secure Coding Practices Every Developer Must FollowSecurity should be a top priority for every developer, regardless of the project size or industry. With cyber threats evolving daily, secure coding practices are essential to prevent vulnerabilities that attackers can exploit. Here are 10 secure codi...Feb 3, 2025·4 min read