Secure Code By Design

Programming tactics that prevent vulnerabilities and defend applications against cyber attacks

Teri Radichel
Cloud Security

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Part of my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: GitHub Security | Application Security | Data Breaches

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

In case you missed it, I’m working on a new book on secure programming principles. Similar to my last book, Cybersecurity for Executives in the Age of Cloud, I started writing this new book on secure coding in the form of free form blog posts. This post is simply a place to list all the related topics I’ve written so far in one place and has a list of topics I’m considering and won’t be covering.

The book is focused on code. How can you write defensive software that reduces the chances you give attackers to break into systems? By incorporating some of the concepts I’ll write about into your programming practices you should be able to reduce the risk of software vulnerabilities in your applications at the core, and more holistically.

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award