Secure coding


21 articles

Secure Coding

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Secure Coding

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Python’s versatility and short learning curve are just two factors that explain the language’s 'grip' on cybersecurity

Christian Ali Bravo25 Apr 2024


Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

David González Cuautle29 Feb 2024


Secure Coding

Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Secure Coding

Capture the flag: 5 websites to sharpen your hacking skills

Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills

Christian Ali Bravo13 Nov 2023


Secure Coding

5 of the top programming languages for cybersecurity

5 of the top programming languages for cybersecurity

Secure Coding

5 of the top programming languages for cybersecurity

While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles

Christian Ali Bravo27 Sep 2023


Secure Coding, Business Security

Can open-source software be secure?

Can open-source software be secure?

Secure Coding, Business Security

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 2023


Digital Security, Secure Coding

DEF CON 31: US DoD urges hackers to go and hack ‘AI’

DEF CON 31:  US DoD urges hackers to go and hack ‘AI’

Digital Security, Secure Coding

DEF CON 31: US DoD urges hackers to go and hack ‘AI’

The limits of current AI need to be tested before we can rely on their output

Tony Anscombe18 Aug 2023


Secure Coding

All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

Secure Coding

All eyes on APIs: Top 3 API security risks and how to mitigate them

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

Phil Muncaster01 Jun 2023


Secure Coding

Cracked it! Highlights from KringleCon 5: Golden Rings

Cracked it! Highlights from KringleCon 5: Golden Rings

Secure Coding

Cracked it! Highlights from KringleCon 5: Golden Rings

Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings

Rene Holt09 Jan 2023


Secure Coding

Integer overflow: How does it occur and how can it be prevented?

Integer overflow: How does it occur and how can it be prevented?

Secure Coding

Integer overflow: How does it occur and how can it be prevented?

Make no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.

Rene Holt21 Feb 2022