DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
Securing Your Software Supply Chain with JFrog and Azure
Register Today

Trending

  • New ORM Framework for Kotlin
  • Hiding Data in Cassandra
  • Grow Your Skills With Low-Code Automation Tools
  • Understanding Data Compaction in 3 Minutes

Trending

  • New ORM Framework for Kotlin
  • Hiding Data in Cassandra
  • Grow Your Skills With Low-Code Automation Tools
  • Understanding Data Compaction in 3 Minutes
  1. DZone
  2. Coding
  3. Frameworks
  4. July in Security: SQL Injection, DevSecOps, and Spring Boot

July in Security: SQL Injection, DevSecOps, and Spring Boot

Here's the best of security from July as decided by you, the awesome DZone readership, and a few other cybersecurity items of interest.

Jordan Baker user avatar by
Jordan Baker
·
Aug. 07, 17 · Opinion
Like (6)
Save
Tweet
Share
4.94K Views

Join the DZone community and get the full member experience.

Join For Free

Unlock Your Security Knowledge 

SQL Injection Cheat Sheet: How to Prevent Attacks: We go over the basics of one of the oldest attacks known to the internet, SQL Injection. 

Go Beyond Username/Password With Modern Authentication: A review of authentication techniques, such as two-factor authentication, that don't rely on the use of a username/password combination.

From Water-Scrum-Fall to DevSecOps: We talk about ways companies can get their DevSecOps teams where they need to be in order to protect data and ensure security compliance.

Linux Kernel Capabilities Explained: We take a quick look at Linux Kernel's permission processes and show you how to use them to keep your web page or app secure.

Example of Multiple Login Pages With Spring Security and Spring Boot: Learn how to create a secure, Java-based login platform using the Spring Security and Spring Boot frameworks.


The Best From the Rest

Hacker Admits to Mirai Attack Against Deutsche Bank by Tom Spring, July 24, 2017.

Someone Hijacks a Popular Chrom Extension to Push Malware by Swati Khandelwal, July 31, 2017.

Ransomware Recap: BrainLag, Ransed, and a "Kind" Ransomware Take the Spotlight by Tren Micro Ransomware Solutions, July 21, 2017. 


Find Your Next Great Security Gig

.NET Developer
Headforwards
Location: Cornwall, United Kingdom
Experience: Will deliver high-quality, unit tested feature code, and review and address any vulnerabilities found during security testing. Good knowledge of front-end technologies (HTML, CSS, JavaScript) and API and WCF service development. Experience writing code ASP.NET MVC and experience writing unit and integration tests.

Senior DevOps Engineer
JFrog
Location: Netanya, Israel or Remote

Experience: This role is responsible for running the day-to-day security functions at JFrog, including vulnerability scans and pen testing, reviewing policies and procedures, and evaluating new technologies and standards in the security domain.  The ideal candidate will have 5+ years in a hands-on security engineering role, strong understanding of network fundamentals, and experience using a wide range of security tools (vulnerability scanners, forensics software, malware analysis and protection, content filtering, etc.). 


Take a Deep Dive Into Security With Our Publications

The DZone Guide to Application Security featuring articles by Jim Bird, John Melton, Tony Rice, Chris Lamb, and Sherif Koussa.

Practical DNS Refcard: Managing Domains for Safety, Reliability, and Speed by Michael Hughes

Spring Security Spring Framework Spring Boot sql Injection

Opinions expressed by DZone contributors are their own.

Trending

  • New ORM Framework for Kotlin
  • Hiding Data in Cassandra
  • Grow Your Skills With Low-Code Automation Tools
  • Understanding Data Compaction in 3 Minutes

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: