Security
-
Software Development
TLS Client Authentication
I decided to do a prototype for an electronic identification scheme, so I investigated how to do TLS client authentication…
Read More » -
Enterprise Java
Theft-Proof Java EE – Securing Your Java EE Enterprise Applications
Øredev is just a couple of days away, and I was invited to give two presentations. One of them is…
Read More » -
Software Development
Why You Should Encrypt ALL Personally Identifiable Information (PII)
Many critics have pointed out that Ashley Madison should have encrypted all personally identifiable information (PII). The database contained sensitive…
Read More » -
Software Development
Top 10 Lists for Designing and Writing Secure and Safe Software
If you care about writing secure code, should know all about these Top 10 lists: OWASP Top 10 The OWASP…
Read More » -
Software Development
Implementing Client-Side Row-Level Security with jOOQ
Some time ago, we’ve promised to follow up on our Constraints on Views article with a sequel showing how to…
Read More » -
Software Development
How to Keep REST API Credentials Secure
If you are building mobile apps then you are connecting to some REST API. For example, if you want to…
Read More » -
Core Java
9 Security mistakes every Java Developer must avoid
Checkmarx CxSAST is a powerful Source Code Analysis (SCA) solution designed for identifying, tracking and fixing technical and logical security…
Read More » -
DevOps
Can DevOps(Sec) make Software more Secure?
There was a lot of talk at RSA this year about DevOps and security: DevOpsSec or DevSecOps or Rugged DevOps…
Read More » -
Software Development
Backdoors, Sabotage or Just Plain Stupidity
Someone on your development team, or a contractor or a consultant, or one of your sys admins, or a bad…
Read More »