The HackerNoon Newsletter: Futures of Ethereum II – Censorship Resistance (2/16/2025) Post date February 16, 2025 Post author By Noonification Post categories In application-security, blockchain, crypto-trading, crypto-wallets, ethereum-blockchain, hackernoon-newsletter, latest-tect-stories, noonification, sentiment-analysis, startup, tether
Generative AI’s Double-Edged Sword: Unlocking Potential While Mitigating Risks Post date February 5, 2025 Post author By Mend.io Post categories In application-security, artificial-intelligence, cybersecurity, good-company, mend, risk-management, shadow-ai, vulnerabilities
Building Asset and Risk Management on Codebase with Semgrep Post date September 26, 2024 Post author By Dmitrii Mariushkin Post categories In application-security, appsec, asset-management, cybersecurity, data-analytics, data-mining, risk-management, semgrep
Here’s What I Learned About Securing APIs With OAuth 2.0: A Deep Dive into OAuth 2.0 Implementation Post date September 24, 2024 Post author By aneesh kumar Post categories In application-development, application-security, oauth, oauth2, security-token
Implementing Secure Role-Based Access Control (RBAC) in a Next.js Application Using Permit.io Post date September 16, 2024 Post author By Mr. Ånand Post categories In application-security, authentication, authorization, JavaScript, nextjs, nodejs, permissions, reactjs
Software Security Report Finds JavaScript Applications Have Fewer Flaws Than Java and .NET Post date February 8, 2023 Post author By Matt Campbell Post categories In .NET, application-security, cloud-security, development, devops, java, JavaScript, News, static-analysis
The Importance of Integrity Checks in JavaScript Post date July 7, 2021 Post author By Viduni Wickramarachchi Post categories In application-security, content-delivery-network, front-end-development, JavaScript, web-development
The Urban Myths of Secure Coding: Part 1 Post date May 6, 2021 Post author By Veracode Post categories In application-security, devsecops, good-company, open source, open-source-vulnerabilities, secure-coding, software-development, state-of-software-security
Balancing Cybersecurity Risk with Technological Innovation: Using Policy as Code Post date April 3, 2021 Post author By Andrew Zola Post categories In application-security, cyber-risks, cyber-threats, cybersecurity, devsecops, risk-assessment, risk-management, security, web-monetization
Web Application Security Explained: Why Is It Important and What Does It Include? Post date March 20, 2021 Post author By Abeshek_AntWak Post categories In application-security, cybersecurity, security, security-testing, testing, web-app-security, web-apps, web-security
Stop Leaving Secrets In Your Code to Help Your Developers Be Security-Focused Post date March 1, 2021 Post author By BairesDev Post categories In App Development, application-security, appsec, coding, devsecops, software engineering, software-development, software-outsourcing