securing.dev
Pseudo-random musings on Security, Software Development, and Life
HOME
CATEGORIES
TAGS
ARCHIVES
SPONSORSHIP
ABOUT
Home
Archives
Archives
Cancel
Archives
2023
27
02
You can’t do "DevSecOps" without doing "DevOps"
11
02
Hacking the OSCP: Recon
25
01
Life after the AI-pocalypse
09
01
Advice for breaking into InfoSec
2022
31
12
Predictions for 2023
28
12
Hacking the OSCP
08
12
Scanning in the IDE: A Bad IDE(A) for Developers
02
12
Great Reads of 2022
14
11
Security Maturity: Geriatric Technologies
14
10
With Technology, there’s no such thing as “Magic"’
28
09
Security Maturity: Geriatric Teams
16
09
Security Maturity: Mature Technologies
09
09
Security Maturity: Mature Teams
31
08
Security Maturity: Adolescent Technologies
10
08
Surviving the Pan-decade: Seclusion
04
08
Security Maturity: Adolescent Teams
26
07
Security Maturity: Immature Technologies
22
07
Security Maturity: Immature Teams
20
07
Security Maturity: Teams & Their Technologies
15
07
Surviving the Pan-decade: 🤬
07
07
DevSecOps Essentials: Talent
30
06
DevSecOps Essentials: Manual Testing
28
06
DevSecOps Essentials: Dynamic Testing
22
06
DevSecOps Essentials: Mitigations
15
06
DevSecOps Essentials: Code Security
06
06
DevSecOps Essentials: Software Asset Management
02
06
DevSecOps Essentials: An Overview
17
05
A Return to Darkness
04
05
Security is a Feature
27
04
Static Analysis: Local vs. Remote Sources
20
04
Comprehensive Static Analysis: Accuracy, Speed, or Completeness
18
04
Binary Static Analysis: Accuracy, Speed, or Completeness
12
04
Static Code Analysis: Accuracy, Speed, or Completeness
08
04
The 3 types of Static Analysis
04
04
Inspirations in Security
Recently Updated
You can’t do "DevSecOps" without doing "DevOps"
Great Reads of 2022
With Technology, there’s no such thing as “Magic"’
Security Maturity: Geriatric Technologies
Scanning in the IDE: A Bad IDE(A) for Developers
Trending Tags
devsecops
application security
software security
maturity
process
essentials
static analysis
civilization
history
learning
Trending Tags
devsecops
application security
software security
maturity
process
essentials
static analysis
civilization
history
learning