programming
![BLint](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/08094431/blint-1500-400x200.webp)
BLint: Open-source tool to check the security properties of your executables
BLint is a Binary Linter designed to evaluate your executables’ security properties and capabilities, utilizing LIEF for its operations. From version 2, BLint can also …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151905/software-dev-400x200.jpg)
Using cloud development environments to secure source code
In this Help Net Security video, Rob Whiteley, CEO at Coder, discusses the cloud development environment (CDE) technology landscape and its benefits. From the earliest stages …
![Omkhar Arasaratnam](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/28120155/omkhar_arasaratnam-2-openssf-400x200.webp)
Transitioning to memory-safe languages: Challenges and considerations
In this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation (OpenSSF), discusses the evolution of memory-safe programming …
![Itamar Friedman](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16135005/itamar_friedman-2-codium_ai-1-400x200.jpg)
AI-driven DevOps: Revolutionizing software engineering practices
In this Help Net Security interview, Itamar Friedman, CEO of Codium AI, discusses the integration of AI into DevOps practices and its impact on software development processes, …
![security](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27150233/security-1600-400x200.webp)
White House: Use memory-safe programming languages to protect the nation
The White House is asking the technical community to switch to using memory-safe programming languages – such as Rust, Python, Swift, C#, Java, and Go – to prevent …
![prompt injection](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25165952/prompt-injection-400x200.jpg)
Are developers giving enough thought to prompt injection threats when building code?
With National Coding Week behind us, the development community has had its annual moment of collective reflection and focus on emerging technologies that are shaping the …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26141959/api2-400x200.jpg)
Understanding how attackers exploit APIs is more important than ever
In this Help Net Security video, Andy Hornegold, Product Lead at Intruder, dives into API security and explores how several recent high-profile breaches were caused by simple …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142001/api3-400x200.jpg)
API tools and services are fueling revenue growth
As more companies recognize APIs as the building blocks of modern software, API tools and services are evolving to meet their needs, according to Postman. Adopting an …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/07124918/supply_chain_security-1-400x200.jpg)
CISO-approved strategies for software supply chain security
Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. …
![dev](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/07184906/dev-400x200.jpg)
Massive GitHub analysis reveals 10 million secrets hidden in 1 billion commits
GitGuardian scanned 1.027 billion new GitHub commits in 2022 (+20% compared to 2021) and found 10,000,000 secrets occurrences (+67% compared to 2022). What is interesting …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
Establishing secure habits for software development in 2023
As a new year commences, it’s not unusual for people to take the opportunity to adopt better practices and principles and embrace new ways of thinking in both their personal …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Trained developers get rid of more vulnerabilities than code scanning tools
An EMA survey of 129 software development professionals uncovered that for those using code scanning tools, only 10% of organizations prevented a higher percentage of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD