Skip to main content

Resources

Buyers guide

Future-proof your development: The SAST/SCA buyer’s guide for the AI era

Lire le rapport
Type
Sujet

Affichage 1 - 12 sur 265 ressources

Article

Understanding Server-Side Template Injection in Golang

SSTI can open the door to escalating security risks such as file inclusion, Cross-Site Scripting (XSS), or even Code Injection Attacks.

Article

OpenCart vulnerability research (v4.0.2.3/3.0.3.9)

Discover the security vulnerabilities in OpenCart's admin and customer functionalities, including XSS, Zip Slip, and SQL Injection exploits. Learn how these flaws impact e-commerce systems and how attackers can exploit them for remote code execution.

Cheat Sheet

Open Source Security in 2024

Article

Top 10 Node.js Security Best Practices

Read about five major Node.js security risks and the top ten best practices you can implement to address them and stay secure while building applications.

Article

Cycle de développement logiciel sécurisé (SDLC sécurisé)

Learn more about Secure Software Development Lifecycle (SSDLC), and how to integrate security at every stage of the SDLC to enhance software integrity and protect against vulnerabilities.

Article

Apache License 2.0 Explained

Learn more about the Apache License 2.0 uses, benefits, and requirements for use in your open source projects while maintaining compliance.

Article

Qu’est-ce qu’une licence MIT ?

Apprenez-en davantage sur la licence MIT (l’un des accords de licence open source les plus simples) et intégrez la conformité des licences dans vos workflows existants.

Article

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.

Article

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Article

Outil d’analyse des vulnérabilités : présentation et fonctionnement

Découvrez les outils d’analyse des vulnérabilités : types, catégories, fonctionnement et méthode pour choisir le meilleur en 2023.

Article

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

Article

Guide complet de la sécurité des applications

La sécurité des applications est l’ensemble des mesures prises pendant le cycle de vie du développement d’une application pour réduire les vulnérabilités, améliorer la sécurité et protéger les données sensibles.