Thinking about security at the end of your development cycle is already too late. Here’s how to fix it.
#1about 4 minutes
The high cost and consequences of security breaches
Major companies like Uber and Microsoft have suffered massive data breaches, costing millions and highlighting the severe financial and reputational risks of poor security.
#2about 6 minutes
Foundational practices for writing secure software code
Writing secure code starts with fundamental practices like proper input validation, applying threat modeling methodologies like STRIDE, and adhering to the principle of least privilege.
#3about 5 minutes
Mitigating supply chain attacks with DevSecOps practices
Vulnerabilities in third-party libraries, like the SolarWinds and Log4j incidents, necessitate a DevSecOps approach to integrate security checks throughout the software development lifecycle.
#4about 2 minutes
Essential security measures for protecting public APIs
Publicly exposed APIs must be protected using strong authentication, TLS/SSL encryption for data in transit, and defenses against common attack vectors.
#5about 5 minutes
Protecting data with database encryption and temporal tables
Encrypting sensitive data at the database level protects it even if breached, while temporal tables provide a complete audit trail for forensic analysis.
#6about 2 minutes
Implementing a robust penetration testing strategy
Regular penetration testing, distinct from QA, should be a standard practice using methodologies like black-box or white-box testing and frameworks like the OWASP Top 10.
#7about 1 minute
Maintaining security by separating work and personal devices
Avoid using company-issued laptops for personal or freelance projects to prevent legal liabilities and security compromises between environments.
#8about 3 minutes
Q&A on vulnerable libraries and team security responsibility
The session concludes with answers to audience questions about tracking open-source vulnerabilities, choosing a pen test environment, and clarifying security roles within an agile team.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 214: Claude Is Leaking, GitHub Is Listening & Axios Hacked!Inside last week’s Dev Digest 214 .
🕵️ Claude source code leaked, analysed and re-written in 2 days
🐙 GitHub auto-opts users into feeding their code to train their AI
🌐 Pretext shows how to show complex text rendering in the browser
🤖 How to securin...
Chris Heilmann
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
Dev Digest 191: Malware interviews, EU ❤️ Open Source and Skilled AgentsInside last week’s Dev Digest 191 .
💻 Want to write for the WeAreDevelopers Magazine?
⚒️ Claude skills - a less token hungry MCP?
🫰 How much does Cursor spend on AWS?
🧠 LLMs and Brain Rot
🟥 Change your NPM tokens now!
🧑 Fake AI recruiters delivering...
Daniel Cranney
The Overflow: 5 Security and Privacy Tools for DevelopersWe’re back again with another edition of the Overflow, where we share some of the best tools we’ve found from around the web that we just couldn’t cram into the already jam-packed editions of the Dev Digest.
So let’s take a look at five security and ...
From learning to earning
Jobs that call for the skills explored in this talk.