Within the process of building a software, understanding its functionality, and identifying possible security requirements is a key…
In this article, we’ll cover an example that can explain what the Software Bill of Materials (SBOM) is, and how it is referenced by…
As developers, we have as focus to think about applications that are more and more secure, more and more efficient in keeping user data…
When we look at the development world and its evolution in the last few years, we can say that one of the fields that had least followed the…
Before we start talking about Perfect Forward Secrecy (PFS), let’s understand a little bit about the context of how we got here. In…
We already know that some IT paradigms must be rethought when we look at the world of cloud security. Identity Access Management is one of…
In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to…
In recent years, the use of containers to pack and deliver our applications has become increasingly present in development processes.
OWASP is one of the best sources of knowledge for all professionals who wish to work with software development, and to have a robust…