Unlock Your Security Knowledge
SQL Injection Cheat Sheet: How to Prevent Attacks: We go over the basics of one of the oldest attacks known to the internet, SQL Injection.
Go Beyond Username/Password With Modern Authentication: A review of authentication techniques, such as two-factor authentication, that don't rely on the use of a username/password combination.
From Water-Scrum-Fall to DevSecOps: We talk about ways companies can get their DevSecOps teams where they need to be in order to protect data and ensure security compliance.
Linux Kernel Capabilities Explained: We take a quick look at Linux Kernel's permission processes and show you how to use them to keep your web page or app secure.
Example of Multiple Login Pages With Spring Security and Spring Boot: Learn how to create a secure, Java-based login platform using the Spring Security and Spring Boot frameworks.
The Best From the Rest
Hacker Admits to Mirai Attack Against Deutsche Bank by Tom Spring, July 24, 2017.
Someone Hijacks a Popular Chrom Extension to Push Malware by Swati Khandelwal, July 31, 2017.
Ransomware Recap: BrainLag, Ransed, and a "Kind" Ransomware Take the Spotlight by Tren Micro Ransomware Solutions, July 21, 2017.
Find Your Next Great Security Gig
Location: Cornwall, United Kingdom
Experience: This role is responsible for running the day-to-day security functions at JFrog, including vulnerability scans and pen testing, reviewing policies and procedures, and evaluating new technologies and standards in the security domain. The ideal candidate will have 5+ years in a hands-on security engineering role, strong understanding of network fundamentals, and experience using a wide range of security tools (vulnerability scanners, forensics software, malware analysis and protection, content filtering, etc.).
Take a Deep Dive Into Security With Our Publications
The DZone Guide to Application Security featuring articles by Jim Bird, John Melton, Tony Rice, Chris Lamb, and Sherif Koussa.