programming
![programming](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095527/programming-400x200.jpg)
How students learn to code, evaluate job opportunities
New data from HackerRank reveals the technical skills, learning preferences and career motivators of collegiate software engineers. The findings provide a playbook for …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095831/keyboard-400x200.jpeg)
Countering threats: Steps to take when developing APIs
High profile data breaches resulting from faulty APIs continue to make headlines. In the last few months alone, T-Mobile’s data breach resulted in hackers stealing personal …
![Python](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100057/python-400x200.jpg)
Python-based attack tools are the most common vector for launching exploit attempts
Hackers have an obvious predilection for Python-based attack tools, says Imperva. “When examining the use of Python in attacks against sites we protect, the result was …
![WhiteSource Web Advisor](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100352/whitesource-wa-400x200.jpg)
Secure your open source components automatically, continuously, and silently
In this podcast recorded at Black Hat USA 2018, Azi Cohen, General Manager at WhiteSource, talks about open source lifecycle management. WhiteSource manages open source …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105745/github-dark-400x200.jpg)
GitHub adds Python support for security alerts
GitHub has announced that its recently introduced feature for alerting developers about known vulnerabilities in software packages that their projects depend on will now also …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
George Gerchow, CSO at Sumo Logic: Our DevSecOps strategy
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, their purpose-built, cloud-native service analyzes more than 100 …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
Four common API vulnerabilities and how to prevent them
Proper security measures are one of the most important aspects of building an application programming interface, or API. It’s great for an API to connect systems and give …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103547/general-400x200.jpg)
IT ops and engineering are embracing automation to increase business agility
Based on a survey of nearly 700 engineering and operations individuals globally, a report by Indeni and GNS3 reveals a programming knowledge gap that is having an impact on …
![mobile code](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102643/mobile-code-400x200.jpg)
Eavesdropper vulnerability exposes sensitive corporate communications data
Appthority published research on its discovery of the Eavesdropper vulnerability, caused by developers carelessly hard coding their credentials in mobile applications that use …
![Node.js Foundation](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105659/nodejs-400x200.jpg)
Node.js security: Are developers confident in the quality of their code?
A NodeSource and Sqreen joint developer survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in …
![Stack Overflow](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09103003/stack_overflow-400x200.jpg)
Secure coding in Java: Bad online advice and confusing APIs
For programmers and software developers, the Internet forums provide a great place to exchange knowledge and seek answers to concrete coding conundrums. Alas, they are not …
![Android unlocked](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111119/android-unlock-400x200.jpg)
How secure are mobile banking apps?
Do banking institutions have a good handle on the things they need to remediate and new control layers they need to adopt to keep users secure? To answer those questions, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD