July in Security: SQL Injection, DevSecOps, and Spring Boot
Here's the best of security from July as decided by you, the awesome DZone readership, and a few other cybersecurity items of interest.
Join the DZone community and get the full member experience.
Join For FreeUnlock Your Security Knowledge
SQL Injection Cheat Sheet: How to Prevent Attacks: We go over the basics of one of the oldest attacks known to the internet, SQL Injection.
Go Beyond Username/Password With Modern Authentication: A review of authentication techniques, such as two-factor authentication, that don't rely on the use of a username/password combination.
From Water-Scrum-Fall to DevSecOps: We talk about ways companies can get their DevSecOps teams where they need to be in order to protect data and ensure security compliance.
Linux Kernel Capabilities Explained: We take a quick look at Linux Kernel's permission processes and show you how to use them to keep your web page or app secure.
Example of Multiple Login Pages With Spring Security and Spring Boot: Learn how to create a secure, Java-based login platform using the Spring Security and Spring Boot frameworks.
The Best From the Rest
Hacker Admits to Mirai Attack Against Deutsche Bank by Tom Spring, July 24, 2017.
Someone Hijacks a Popular Chrom Extension to Push Malware by Swati Khandelwal, July 31, 2017.
Ransomware Recap: BrainLag, Ransed, and a "Kind" Ransomware Take the Spotlight by Tren Micro Ransomware Solutions, July 21, 2017.
Find Your Next Great Security Gig
.NET Developer
Headforwards
Location: Cornwall, United Kingdom
Experience: Will deliver high-quality, unit tested feature code, and review and address any vulnerabilities found during security testing. Good knowledge of front-end technologies (HTML, CSS, JavaScript) and API and WCF service development. Experience writing code ASP.NET MVC and experience writing unit and integration tests.
Senior DevOps Engineer
JFrog
Location: Netanya, Israel or Remote
Experience: This role is responsible for running the day-to-day security functions at JFrog, including vulnerability scans and pen testing, reviewing policies and procedures, and evaluating new technologies and standards in the security domain. The ideal candidate will have 5+ years in a hands-on security engineering role, strong understanding of network fundamentals, and experience using a wide range of security tools (vulnerability scanners, forensics software, malware analysis and protection, content filtering, etc.).
Take a Deep Dive Into Security With Our Publications
The DZone Guide to Application Security featuring articles by Jim Bird, John Melton, Tony Rice, Chris Lamb, and Sherif Koussa.
Practical DNS Refcard: Managing Domains for Safety, Reliability, and Speed by Michael Hughes
Opinions expressed by DZone contributors are their own.
Trending
-
New ORM Framework for Kotlin
-
Hiding Data in Cassandra
-
Grow Your Skills With Low-Code Automation Tools
-
Understanding Data Compaction in 3 Minutes
Comments