all InfoSec news
How to use IAST to prove exploitable vulnerabilities within your first-party code
DEV Community dev.to
In some recent articles I shared how you as a developer can add security to your skillset by using New Relic capabilities. I also dug deeper into ways on how to mitigate hidden security risks of open source software libraries. Both of these blogs focused on third-party code and how it can impact the security of your software applications. In this article I will focus on the security of your own custom code, i.e. the code that you write …
articles blogs capabilities code developer devsecops hidden iast new relic observability open source party prove risks security security risks software software libraries third third-party vulnerabilities