Comprehensive Guide to API Error Code Management

Comprehensive Guide to API Error Code Management

Mastering API error codes is essential for building robust and user-friendly applications. This comprehensive guide explores best practices for handling and documenting errors, ensuring clear communication between your API and its users ...
The impact of automating open source dependency management

The impact of automating open source dependency management

Recently, I chatted with developers from a customer in a heavily regulated industry. They were manually updating their open source dependencies and wanted to find a better solution to save time. Keeping ...
The impact of automating open source dependency management

The impact of automating open source dependency management

Recently, I chatted with developers from a customer in a heavily regulated industry. They were manually updating their open source dependencies and wanted to find a better solution to save time. Keeping ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

Complex Supply Chain Attack Targets GitHub Developers

Unidentified threat actors used multiple tactics to launch a sophisticated software supply-chain campaign targeting developers on the GitHub platform, including members of the popular Top.gg community that includes more than 170,000 members ...
Security Boulevard
App Security: Tanya Janca Unveils Trends & Tackles Challenges | Expert Insights & Strategies 🛡️

Application Security Trends & Challenges with Tanya Janca

In this episode, noteworthy guest Tanya Janca returns to discuss her recent ventures and her vision for the future of Application Security. She reflects on the significant changes she has observed since ...

Unveiling BlazeStealer Malware Python Packages on PyPI

In a recent revelation, a cluster of malicious Python packages has infiltrated the Python Package Index (PyPI), posing a significant threat to developers’ systems by aiming to pilfer sensitive information. These deceptive ...
NETSCOUT cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

GitHub Vulnerability Put Code Packages at Risk of Repojacking

A new vulnerability found in GitHub’s operations could have given bad actors another way of getting around the code hosting platform’s security protections and exposing thousands of code packages to being hijacked ...
Security Boulevard
Microsoft Windows malware software supply chain

National Cybersecurity Strategy Requires Orgs to Rethink Software Quality

Software development is a global effort, with DevOps teams often dispersed around the world. According to Statista, there will be over 27.7 million developers worldwide in 2023. That’s a lot of engineers creating ...
Security Boulevard

Augmented Software Engineering in an AI Era

Artificial Intelligence (AI) has been making waves in many industries, and software engineering is no exception. AI has the potential to revolutionize the way software is developed, tested, and maintained, bringing a ...
threat modeling, ICS, VPNs, APIs, risk, left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

Debunking Three Common Threat Modeling Myths

The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to an organization’s system, but it also creates a framework for informed decision-making, ...
Security Boulevard

Application Security Check Up