#securecoding search results

👉 secdim.com/blackhat/ Join us at BlackHat Europe in London 🇬🇧 @BlackHatEvents #BlackHat #appsec #securecoding #ctf #ai


Vibe Coding Will Get You HACKED (Here's the Fix) Thank you to @ThreatLocker​⁠​⁠ for sponsoring this video and my trip to Black Hat USA 2025! #blackhat #threatlocker #securecoding


"In this post I wanted to briefly highlight some of the languages I use now and have used in the past and also highlight how many can be used with Oracle databases either directly or indirectly to process data." - petefinnigan.com/weblog/archive… #oracleace #securecode #securecoding


Webinar Alert: Cybersecurity for Developers – Secure Coding Practices 🎙️ Mahmud Ibrahim Kani (CEO, Apexium) 🎤 Dheer Nimesh Gupta (Senior Software Developer) 📅 Dec 14, 2025 | ⏰ 2PM (UTC+1) | 📍 Microsoft Teams Register: apexiumtechnologies.com/webinar #SecureCoding #CyberSecurity

ApexiumTechLtd's tweet image. Webinar Alert: Cybersecurity for Developers – Secure Coding Practices

🎙️ Mahmud Ibrahim Kani (CEO, Apexium)
🎤 Dheer Nimesh Gupta (Senior Software Developer)
📅 Dec 14, 2025 | ⏰ 2PM (UTC+1) | 📍 Microsoft Teams

Register: apexiumtechnologies.com/webinar
#SecureCoding #CyberSecurity

El #OWASP Top 10 versión 2025 RC1 es una guía esencial para desarrolladores y profesionales de la #ciberseguridad. Resume el consenso global sobre las vulnerabilidades más críticas que deben abordarse para proteger los sistemas ante amenazas reales #SecureCoding #WebSecurity ↘️

henryraul's tweet image. El #OWASP Top 10 versión 2025 RC1 es una guía esencial para desarrolladores y profesionales de la #ciberseguridad. Resume el consenso global sobre las vulnerabilidades más críticas que deben abordarse para proteger los sistemas ante amenazas reales #SecureCoding #WebSecurity ↘️

Building security into every line of code. @PieterDanhieux from @SecCodeWarrior joins @ashimmy to discuss how AI is reshaping development, the new risks it introduces, and why mastering secure coding is more important than ever. Watch: buff.ly/uQ7TG3g #AI #SecureCoding


"There are some things that are too sensitive to exist". This is such a powerful and important statement. Really interesting chat with Mike Loewy from TideCloak #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


I’m excited to share that I have officially passed the "Certified Security Code Review – Beginners (CSCRB)" certificate exam, issued by Red Team Leaders (RTL). #CyberSecurity #SecureCoding #CodeReview #AppSec #CSCRB #EthicalHacking #SecurityByDesign #OWASP #VAPT

MrTaherAmine's tweet image. I’m excited to share that I have officially passed the "Certified Security Code Review – Beginners (CSCRB)" certificate exam, issued by Red Team Leaders (RTL). 

#CyberSecurity #SecureCoding #CodeReview #AppSec #CSCRB #EthicalHacking #SecurityByDesign #OWASP #VAPT

Stop Trusting Input: 3 RULES Thank you to ThreatLocker for sponsoring this video and my trip to Black Hat USA 2025. #securecoding #threatlocker #blackhat


The root of ineffable cryptography: giving people a key in pieces that they never need to hold Fascinating chat with Mike Loewy from TideCloak about overcoming the key problem. #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2 Fui dev, arquitecto y también instructor certificado por Sun y Oracle. Java no solo cambió el desarrollo: Cambió mi vida. Gracias por 30 años de café, comunidad y código. #Java30 #SrJava #SecureCoding

knaverit's tweet image. ☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2
Fui dev, arquitecto y también instructor certificado por Sun y Oracle.
Java no solo cambió el desarrollo: Cambió mi vida.

Gracias por 30 años de café, comunidad y código.
#Java30 #SrJava #SecureCoding

Super smart! TideClock co-founder Mike Loewy on the academic principles behind why ineffable cryptography works. #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


#AI tools can generate code in seconds, but can expose your apps. In this week’s AI/LLM Security Intro Series: 💻 How unvalidated AI outputs = vulnerabilities ⚙️ Examples + #SecureCoding tips 🛡️ Best practices for reviewing 🎥 Full video on YouTube: youtu.be/1hpiF_A6c7E


Security starts at line one. 💻 @beyond__tech Protocol adheres to strict Secure Development Practices, including mandatory code reviews and security-focused development frameworks. Building defense into the DNA of the protocol from day one. #SecureCoding #DevSecOps

sam_brgss's tweet image. Security starts at line one. 💻

@beyond__tech Protocol adheres to strict Secure Development Practices, including mandatory code reviews and security-focused development frameworks.

Building defense into the DNA of the protocol from day one.

#SecureCoding #DevSecOps

Ready for real ROI from #AppSec? 🚀 Paysafe boosted developer productivity by 45%, cut early vulnerabilities & topped the SCW Trust Score® Financial benchmark with our #securecoding program. Build a lasting developer-driven security culture! Learn how: ow.ly/VFhe50Xc48k

SecCodeWarrior's tweet image. Ready for real ROI from #AppSec? 🚀 Paysafe boosted developer productivity by 45%, cut early vulnerabilities & topped the SCW Trust Score® Financial benchmark with our #securecoding program. Build a lasting developer-driven security culture! Learn how: ow.ly/VFhe50Xc48k

Most breaches still come down to bad code. 😬 This demo shows how teams are changing that—by giving devs hands-on practice in real tools like VS Code. Short, standards-aligned training. Real impact. ▶️ sans.org/u/1D14 #DevSecOps #SecureCoding

SANSInstitute's tweet image. Most breaches still come down to bad code.
😬
This demo shows how teams are changing that—by giving devs hands-on practice in real tools like VS Code.

Short, standards-aligned training. Real impact.

▶️ sans.org/u/1D14

#DevSecOps #SecureCoding

Embracing the idea that we can share evidence (a key fragment was used) without ever having to share the key fragment. Digging into ineffable crypto chat with Mike Loewy from TideCloak #DevSecOps #SecureCoding #SoftwareSecurity #AppSec


🐛 SPOT THE BUG CHALLENGE 🐛 Can you identify the critical vulnerability in this PHP authentication function? Drop your answer in the comments! 👇 #CyberSecurity #SecureCoding #PHP #Authentication #SpotTheBug #InfoSec #CyberSyncHub

CyberSyncHub's tweet image. 🐛 SPOT THE BUG CHALLENGE 🐛

Can you identify the critical vulnerability in this PHP authentication function?

Drop your answer in the comments! 👇

#CyberSecurity #SecureCoding #PHP #Authentication #SpotTheBug #InfoSec #CyberSyncHub

🤖 #AI systems are gaining autonomy — but what happens when they act beyond their intended scope? This week’s episode: Excessive Agency – Controlling AI Autonomy Risks. 🎥 Watch the full episode: youtu.be/2xaLDa2J6sE #LLMSecurity #SecureCoding #AIgovernance #SecureDevelopment


No results for "#securecoding"
No results for "#securecoding"
No results for "#securecoding"
Loading...

Something went wrong.


Something went wrong.


United States Trends