Tag: Security

Trust as a service for validating OSS dependencies

This is part two of our conversation with Kubernetes project cofounder Craig McLuckie, whose new company helps developers build safer software by validating where code came from and that it’s been properly maintained. ...
Continue Reading Trust as a service for validating OSS dependencies

How the cocreator of Kubernetes is helping developers build safer software

Ben and Ryan chat with Craig McLuckie, cofounder of the Kubernetes project and cofounder/CEO of Stacklok, which helps developers and open-source communities build safer, more secure software. ...
Continue Reading How the cocreator of Kubernetes is helping developers build safer software

Zero trust with zero problems

The home team chats with Alex Bovee, cofounder and CEO of identity access management company ConductorOne, about balancing security and productivity in developer workflows, why tech companies have shifted everything left, and the logic behind zero trust. ...
Continue Reading Zero trust with zero problems

Application security audit: an in-depth guide

Introduction What are application security audits? In information technologies departments, application security audits are systematic evaluations conducted to assess the security posture of an organization’s applications. Application security audits involve finding possible threats and determining the organization’s attack surface. The different vectors that attackers can leverage to harm a corporation determine this scope. Role of application security audits in risk management By uncovering vulnerabilities, audits help organizations prioritize and implement necessary security controls, reducing the risks associated with...
Continue Reading Application security audit: an in-depth guide

The hidden dangers of using nulled WordPress plugins and themes – CyberSEO Pro

Explore the hidden dangers of using nulled WordPress plugins and themes. Learn how digital villains exploit “free” software to compromise your website and why PHP scripts pose a unique risk. ...
Continue Reading The hidden dangers of using nulled WordPress plugins and themes – CyberSEO Pro

CSRF vs XSS: What is the difference?

Web application security is a big topic, and two terms you might hear often are XSS and CSRF. They both point to ways websites can be attacked, even though they work differently. To break it down simply: XSS stands for Cross-site scripting. It’s like someone sneaking a message into a conversation. CSRF, or Cross-site request forgery, is like someone pretending to be you to trick others. Though they have different ways of causing trouble, they do...
Continue Reading CSRF vs XSS: What is the difference?

Passkeys: What the Heck and Why?

These things called passkeys sure are making the rounds these days. They were a main attraction at W3C TPAC 2022, gained support in Safari 16, are finding their way into macOS and iOS, and are slated to … Passkeys: What the Heck and Why? originally published on CSS-Tricks, which is part of the DigitalOcean family. You should get the newsletter. ...
Continue Reading Passkeys: What the Heck and Why?

Find & Fix security issues in your GraphQL API with Escape’s Postman integration.

Improve the Security of Your GraphQL API with Escape and Postman Are you tired of dealing with pesky API vulnerabilities? Want to take your GraphQL game to the next level? Introducing the perfect combo for GraphQL success – Escape and Postman. Escape is a tool that helps developers automatically and ...
Continue Reading Find & Fix security issues in your GraphQL API with Escape’s Postman integration.

2022 Roundup of Web Research

We’ve started making a tradition of rounding up the latest front-end research at the end of each year. We did it in 2020 and again in 2021. Reports are released throughout the year by a bunch of different companies … 2022 Roundup of Web Research originally published on CSS-Tricks, which is part of the DigitalOcean family. You should get the newsletter. ...
Continue Reading 2022 Roundup of Web Research

Feedback Driven API exploration at the service of GraphQL Security

Introduction When programming a tool for a dynamic security scan of an API, you need a way to know what requests you can send, with what parameters and in what order so you can have maximum API coverage to improve the scan quality. The whole point is to generate legitimate ...
Continue Reading Feedback Driven API exploration at the service of GraphQL Security