Secure coding


21 articles

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Python’s versatility and short learning curve are just two factors that explain the language’s 'grip' on cybersecurity

Christian Ali Bravo25 Apr 2024


Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

David González Cuautle29 Feb 2024


Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills

Christian Ali Bravo13 Nov 2023


5 of the top programming languages for cybersecurity

5 of the top programming languages for cybersecurity

5 of the top programming languages for cybersecurity

While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles

Christian Ali Bravo27 Sep 2023


Can open-source software be secure?

Can open-source software be secure?

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 2023


DEF CON 31: US DoD urges hackers to go and hack ‘AI’

DEF CON 31:  US DoD urges hackers to go and hack ‘AI’

DEF CON 31: US DoD urges hackers to go and hack ‘AI’

The limits of current AI need to be tested before we can rely on their output

Tony Anscombe18 Aug 2023


All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

Phil Muncaster01 Jun 2023


Cracked it! Highlights from KringleCon 5: Golden Rings

Cracked it! Highlights from KringleCon 5: Golden Rings

Cracked it! Highlights from KringleCon 5: Golden Rings

Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings

Rene Holt09 Jan 2023


Integer overflow: How does it occur and how can it be prevented?

Integer overflow: How does it occur and how can it be prevented?

Integer overflow: How does it occur and how can it be prevented?

Make no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.

Rene Holt21 Feb 2022