Best of VulnerabilityJanuary 2023

  1. 1
    Article
    Avatar of dzDZone·3y

    Top 10 Secure Coding Practices

    This guide will share the top ten secure coding practices that every developer should know. Security breaches rose 20.5% in 2021 as cybercriminals became more sophisticated during the global pandemic. We'll cover the most common forms of cyber attacks that you need to be aware of as a developer.

  2. 2
    Article
    Avatar of systemweaknessSystem Weakness·3y

    Ethical Hacking

    Ethical hacking, also known as ‘white hat’ hacking, is the practice of using hacking techniques for the purpose of identifying and resolving security vulnerabilities in computer systems and networks. Ethical hackers play a crucial role in keeping our digital world safe, says Imila Maheshan.

  3. 3
    Article
    Avatar of notedNoted·3y

    Docker Vulnerability Scanning 102 - Going Deeper

    Docker Vulnerability Scanning 102 - Going Deeper Let's dive deeper into Docker Vulnerability management and security with part 2 of our series. Use Trivy to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.