Germain Oleablog.germain.tech·Oct 14, 2024Comment Exploiter le Shift-Left pour Optimiser la Sécurité Applicative et Renforcer votre Politique de SécuritéIntroduction Dans un monde où la nuisance à la sécurité de l’information évolue à un rythme effréné, la sécurité applicative devient pour moi une priorité incontournable pour les entreprises souhaitant protéger leurs données et leurs systèmes d’infor...Discuss·32 readsshiftleft
Chukwudi Wowothechukwudi.hashnode.dev·Sep 30, 2024Secure CodingSecure Coding is a part of the Secure Software Development Lifecycle (SSDLC) and it speaks to ways vulnerabilities in code can be mitigated against attacks. Common coding flaws include: Buffer Overflow: Buffer can be defined as temporary memory used...DiscussStudy Notesssdlc
Harshith Thalamalaharshithbinnu.hashnode.dev·Dec 15, 2023Behind the Screens: Navigating Software Development Lifecycle and How It's Done SecurelyI've been digging into Software Development Life Cycle (SDLC) lately, after checking out about 40+ articles. However, I found a noticeable absence of a lucid overview of what the branchings are and how this works in real life. So, I decided to take m...DiscussSDLC
STIPΞNforNubsec's Communitynubsec.hashnode.dev·Feb 16, 2023DevSecOps IntroductionWhat is DevSecOps? DevSecOps is a term derived from the acronym for development, security, and operation. It's not something new in the secure software development lifecycle, it's just an art to involve a security perspective from the beginning of th...Discuss·58 readsDevSecOps