Bastien PaulinThe Qonto WayThe day we (almost) lost 1000 customersHow we investigated and solved an issue preventing around 1,000 customers from logging in or performing card paymentsOct 10
Taylor ArmerdinginNerd For TechReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
Vinit PatilMy Certified DevSecOps Professional (CDP) Course and Exam ExperienceDevOps and DevSecOps are undoubtedly highly sought-after skills in the current job market. If you’re already involved in security in any…Jul 27, 2023Jul 27, 2023
Taylor ArmerdinginNerd For TechReport: Build trust (and speed) in your software with DevSecOpsA new report by Black Duck documents the need for improvement in DevSecOps, along with recommendations on how to improve.Oct 8Oct 8
Bastien PaulinThe Qonto WayThe day we (almost) lost 1000 customersHow we investigated and solved an issue preventing around 1,000 customers from logging in or performing card paymentsOct 10
Taylor ArmerdinginNerd For TechReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
Vinit PatilMy Certified DevSecOps Professional (CDP) Course and Exam ExperienceDevOps and DevSecOps are undoubtedly highly sought-after skills in the current job market. If you’re already involved in security in any…Jul 27, 2023
Taylor ArmerdinginNerd For TechReport: Build trust (and speed) in your software with DevSecOpsA new report by Black Duck documents the need for improvement in DevSecOps, along with recommendations on how to improve.Oct 8
Nelson AlfonsoUnmasking Hidden Risks: Why Software Composition Analysis Is Essential for Modern Software…In today’s fast-paced software development landscape, leveraging open-source components and third-party libraries isn’t just common — it’s…Sep 20
Rahul SharanEnhancing Code Security: How to Integrate Snyk (SCA) with GitHub ActionsIn the world of coding, it’s not just about writing lines of text; it’s about writing secure and reliable code. One crucial aspect of this…Sep 27, 20231
Raphael BottinoUnderstanding Different Techniques for Vulnerability PrioritizationWe discussed how vulnerability is a growing problem. Now we understand how different techniques can be used for vulnerability priorization.Sep 101