Secure coding

Secure coding
Enhancing code security: Tools and techniques for safeguarding your code
An understanding of the difference between normal and abnormal developer behavior can help to make applications more secure.

Secure coding
Software dependencies: The silent killer behind the world's biggest attacks
Why software dependencies represent a risk to virtually all software projects.

Secure coding
Software composition analysis and how it can protect your supply chain
Learn about software composition analysis, supply chain risk and how they work together.

Secure coding
Only 20% of new developers receive secure coding training, says report
A lack of secure coding training presents a risk for your organization.

Secure coding
Introduction to Secure Software Development Life Cycle
Learn all about the Secure Software Development Life Cycle.

Secure coding
How to control the flow of a program in x86 assembly
Learn about x86 assembly instructions you can use to control the flow of a program in the ninth article in our x86 assembly series.

Secure coding
Mitigating MFA bypass attacks: 5 tips for developers
Introduction App developers have enough reasons to integrate multi-factor authentication (MFA) into their offerings. Passwords just don’t do the trick, as t

Secure coding
How to diagnose and locate segmentation faults in x86 assembly
Get an overview of how segmentation faults can occur in x86 assembly and C in the eighth article in our x86 assembly series.

Secure coding
How to use the ObjDump tool with x86
Learn about ObjDump by running it against a simple Hello World program in the seventh article in our x86 assembly series.