Enhancing code security: Tools and techniques for safeguarding your code

An understanding of the difference between normal and abnormal developer behavior can help to make applications more secure.

DevSecOps Tools of the trade

Dig into the DevSecOps tools, including Source Composition Analysis and Static Analysis Security Testing, used in cybersecurity work.

Software dependencies: The silent killer behind the world's biggest attacks

Why software dependencies represent a risk to virtually all software projects.

Software composition analysis and how it can protect your supply chain

Learn about software composition analysis, supply chain risk and how they work together.

Only 20% of new developers receive secure coding training, says report

A lack of secure coding training presents a risk for your organization.

Introduction to Secure Software Development Life Cycle

Learn all about the Secure Software Development Life Cycle.

How to control the flow of a program in x86 assembly

Learn about x86 assembly instructions you can use to control the flow of a program in the ninth article in our x86 assembly series.

Mitigating MFA bypass attacks: 5 tips for developers

Introduction App developers have enough reasons to integrate multi-factor authentication (MFA) into their offerings. Passwords just don’t do the trick, as t

How to diagnose and locate segmentation faults in x86 assembly

Get an overview of how segmentation faults can occur in x86 assembly and C in the eighth article in our x86 assembly series.

How to use the ObjDump tool with x86

Learn about ObjDump by running it against a simple Hello World program in the seventh article in our x86 assembly series.