Vladimir GusarovManaged DevOps Pools: Simplifying Self-Hosted Azure Pipeline AgentsIn enterprise software development, the reliability and repeatability of your development process are paramount. To ensure this, we enforce…4d ago
Hadiyal UrmalHow to Implement Azure Key Vault with .NET 8 Web APIMaking Your .NET 8 Web API Secure and Hassle-Free with Azure Key VaultAug 3
Siladitya GhoshUnderstanding Secure Software Development Framework (SSDF)In today’s data-driven world, ensuring that software development processes are efficient, secure, and maintainable is crucial. The Secure…Jul 26Jul 26
ahmetw.ethinCoinmonksSmart Contract Security: tx.origin Authorization Attack VectorsHola a todos!Nov 21, 2023Nov 21, 2023
skedgroupEnsuring Secure Software Development: Best Practices for 2024In an era where cyber threats are constantly evolving, ensuring secure software development is more critical than ever. As we move into…Jun 21Jun 21
Vladimir GusarovManaged DevOps Pools: Simplifying Self-Hosted Azure Pipeline AgentsIn enterprise software development, the reliability and repeatability of your development process are paramount. To ensure this, we enforce…4d ago
Hadiyal UrmalHow to Implement Azure Key Vault with .NET 8 Web APIMaking Your .NET 8 Web API Secure and Hassle-Free with Azure Key VaultAug 3
Siladitya GhoshUnderstanding Secure Software Development Framework (SSDF)In today’s data-driven world, ensuring that software development processes are efficient, secure, and maintainable is crucial. The Secure…Jul 26
ahmetw.ethinCoinmonksSmart Contract Security: tx.origin Authorization Attack VectorsHola a todos!Nov 21, 2023
skedgroupEnsuring Secure Software Development: Best Practices for 2024In an era where cyber threats are constantly evolving, ensuring secure software development is more critical than ever. As we move into…Jun 21
DANISH INAMDARinSystem WeaknessNull Byte Injection- Part-1A Null byte is used in many languages to detect the end of a string. Systems that do not handle null bytes properly can be exploited by…Jun 11, 2022
CyberSecurainCyberSecurity and GDPR complianceSoftware publishers: what procedure should you follow to report a vulnerability (CVE)?The in-house development of software solutions enables companies to meet their own specific needs or those of their customers without…May 22
Security EnthusiastinAVM Consulting BlogSetup DevSecOps pipelines with open-source toolsDevSecOps is the methodology of integrating security tools within the DevOps process in an automated fashion. This multicultural…Oct 4, 20212