all InfoSec news
Topic: development process
The current state of security -- Insights from the German software industry
1 month, 2 weeks ago |
arxiv.org
Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA
1 month, 2 weeks ago |
thehackernews.com
DevSecOps: A beginner's guide
3 months, 3 weeks ago |
malware.news
DevSecOps: A beginner's guide
3 months, 3 weeks ago |
blog.sonatype.com
The Real Cost of Hiring Azure DevOps Engineers
5 months, 1 week ago |
securityboulevard.com
The Power of Dependency Injection in TypeScript
8 months, 1 week ago |
dev.to
Frontend Developers: Security Champions of the New Age
8 months, 4 weeks ago |
securityboulevard.com
Cyber Attack Due to Malicious Open-source Package
9 months, 3 weeks ago |
securityboulevard.com
SCART: Simulation of Cyber Attacks for Real-Time. (arXiv:2304.03657v1 [cs.CR])
11 months, 2 weeks ago |
arxiv.org
How to Write Good Bug Reports
11 months, 3 weeks ago |
infosecwriteups.com
Endianness ( Big / Little Endian ) Concept for Exploit Developers
1 year, 2 months ago |
infosecwriteups.com
Software Security Maturity Models
1 year, 2 months ago |
systemweakness.com
Everything About The Secure Software Development Process
1 year, 2 months ago |
packetstormsecurity.com
Items published with this topic over the last 90 days.
Latest
The current state of security -- Insights from the German software industry
1 month, 2 weeks ago |
arxiv.org
Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA
1 month, 2 weeks ago |
thehackernews.com
DevSecOps: A beginner's guide
3 months, 3 weeks ago |
malware.news
DevSecOps: A beginner's guide
3 months, 3 weeks ago |
blog.sonatype.com
The Real Cost of Hiring Azure DevOps Engineers
5 months, 1 week ago |
securityboulevard.com
The Power of Dependency Injection in TypeScript
8 months, 1 week ago |
dev.to
Frontend Developers: Security Champions of the New Age
8 months, 4 weeks ago |
securityboulevard.com
Cyber Attack Due to Malicious Open-source Package
9 months, 3 weeks ago |
securityboulevard.com
SCART: Simulation of Cyber Attacks for Real-Time. (arXiv:2304.03657v1 [cs.CR])
11 months, 2 weeks ago |
arxiv.org
How to Write Good Bug Reports
11 months, 3 weeks ago |
infosecwriteups.com
Endianness ( Big / Little Endian ) Concept for Exploit Developers
1 year, 2 months ago |
infosecwriteups.com
Software Security Maturity Models
1 year, 2 months ago |
systemweakness.com
Everything About The Secure Software Development Process
1 year, 2 months ago |
packetstormsecurity.com
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Senior SOC Analyst-Weekend Shift
@ Health Care Service Corporation | Dallas (603 Munger Avenue)
Sr. Cyber Security Operations Analyst (Hybrid - Dallas or Houston, TX)
@ AECOM | Houston, TX, United States
Sr. Analyst, Cybersecurity (Lead)
@ Corning | Charlotte, NC, US, 28216