Two P’s of Programming–Persistence and Patience

It was time to put our new vendor product into a new environment, our integration environment. This was a big deal because we previously installed it manually in our development environment and this is the first time that we would be using an automated build/deploy process to install it into our new region. We would …

Continue reading Two P’s of Programming–Persistence and Patience

Application security tips part 2 – SQL Injection

In part one of this series, I discussed the process of threat modeling an application. Once that step is done, you will have some concrete threats for which you need to prepare. Let's take a look at some of the threats that you would likely identify as part of the threat modeling exercise and how …

Continue reading Application security tips part 2 – SQL Injection

Application Security Tips Part One–Threat Modeling

I feel that it is important to lay the foundation of a topic before digging into the details. With that in mind, I’ve chosen to introduce threat modeling at the first part of this series. Threat modeling is still a skill I am mastering, so I’m sure new and inexperienced developers likely don’t really know …

Continue reading Application Security Tips Part One–Threat Modeling

Application Security Tips for New Developers–Series Introduction

The global financial messaging system, SWIFT, was the victim of an $81 million cyber heist from a Bangladeshi bank due to shoddy security. LinkedIn had 117 million accounts stolen from its databases. Tumblr got hacked and had 65 million accounts leaked. The browser company Opera had its synchronization server hacked, leaking the passwords of 2 …

Continue reading Application Security Tips for New Developers–Series Introduction