Chief Scientist Emeritus Fabian Yamaguchi and foundational Code Property Graph technology recognized with IEEE Test of Time Award
The latest executive order on cybersecurity issued today, Jan 16 2024, covers a lot of ground across multiple cybersecurity domains, from software security to post-quantum cryptography. The White House is sending a clear message to both the public and private sectors that the threats from foreign adversaries are more dire than ever. It comes at […]
READ MORECooking and software development have a lot in common. With cooking, you bring together different ingredients, looking at how the flavors blend and textures combine. With software development, you combine different components, including open-source libraries and your code. With cooking, you might decide to take something from a recipe, change it a bit, and create […]
Introduction RESTful APIs are the linchpins of software communication, facilitating data exchange between diverse systems. Their ubiquity and accessibility, however, make them prime targets for exploitation. This article aims to fortify your approach to API security by providing practical tips and shedding light on common vulnerabilities. The Security Landscape of RESTful APIs RESTful APIs are […]
For anyone who’s ever had test anxiety, notification of any audit can send them right back to middle or high school. An internal audit is basically like working with a tutor who helps you find mistakes while an external auditor can feel like having a grumpy teacher marking you down for not crossing a “t” […]
Introduction In software development, transitioning to a microservices architecture is like breaking a big structure into smaller, more connected units. This change lets you scale and be flexible but also brings security challenges. This article looks at how to secure a microservices architecture. It focuses on strategies to isolate and protect each service. Security Risks […]
Are your Docker containers as secure as they should be? In this article, we delve into Docker and containerization, underscoring the paramount importance of security in this increasingly container-reliant era. By exploring best practices and common challenges, this piece equips you with the essential knowledge to safeguard your Docker environments against looming threats. Understanding Docker […]
Back in 1893, the Lizzie Borden murders, where the Massachusetts woman was accused of killing both her parents with an ax, captivated the public and news media. Eventually found not guilty, one fundamental question perplexed police officers and the jury. Every door inside the Borden house had its own lock and corresponding key, an attempt […]
At a basic level, understanding session management is straightforward. When a user authenticates to a server, it creates and sends a token to the browser so that the browser can share the authentication information, making future access easier. However, managing session expiration and ensuring that the session token is valid for the requestor becomes challenging. […]
Introduction In software development, third-party libraries are akin to the gears in a well-oiled machine – essential and powerful, yet requiring careful handling. While they bring efficiency and functionality, they also introduce security risks that can compromise your application. This article aims to guide developers through the labyrinth of third-party library security, offering best practices […]
Whether it’s school or car loans, you know that paying off your debt makes your life easier. It can improve your credit score, giving you more financial security. As a developer, you may also suffer from technical debt that impacts your application’s security. In a world where time to delivery is critical, you may make […]