• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Codemotion Magazine

Codemotion Magazine

We code the future. Together

  • Discover
    • Live
    • Tech Communities
    • Hackathons
    • Coding Challenges
    • For Kids
  • Watch
    • Talks
    • Playlists
    • Edu Paths
  • Magazine
    • Backend
    • Frontend
    • AI/ML
    • DevOps
    • Dev Life
    • Soft Skills
    • Infographics
  • Talent
    • Discover Talent
    • Jobs
  • Partners
  • For Companies
Home » Backend » Cybersecurity

Cybersecurity

black friday, prevent data loss

November 21, 2022 by Rachel Hesser

How to Prevent Data Loss: 13 Best Practices and Strategies

According to a report by Information Security Buzz, ransomware attacks during Black Friday 2021 rose to a staggering 495 million globally. With Black Friday 2022 just around the corner, experts predict there will be a new record this year. With … Read more

zero trust, cloud security, secretless approach

November 16, 2022 by Norman Di Palo

Zero-Trust Model and Secretless Approach: A Complete Guide

As organizations shift more of their workloads and data to the cloud, they face new security challenges. The cloud presents a unique set of challenges for security teams, who must now deal with a more complex and dynamic attack surface. One of these … Read more

Cloud Security, DevSecOps

November 2, 2022 by Codemotion

5 Things You Cannot Miss When Setting Up Your Cloud Security Checklist

The adoption of cloud-based software, platforms and infrastructure has expanded massively in recent years and the trend looks set to continue. Cloud infrastructure services, for example, are forecast to grow by 30.5% in 2023 compared to 2022. It's no … Read more

MVSP, minimum secure product

October 26, 2022 by Codemotion

Security First: Getting Started With Minimum Secure Products

Minimum Secure Products or Minimum Viable Secure Product (MVSP) are guidelines and criteria for creating enterprise or market-ready solutions or services. It consists of a checklist with best practices to follow. The objective is to ensure that B2B … Read more

devops, devsecops, cibersecurity, testing

September 16, 2022 by Emma Grace

Tips to Deliver a Strong Cybersecurity Assessment Report

When done correctly, security assessment reports reduce risk and enable businesses to decide where to improve their cyber defenses. In essence, a security assessment report contains conclusions and suggestions. It concerns weaknesses in an IT … Read more

automation, security, cybersecurity

May 16, 2022 by Jenna Bunnell

How to Implement a Security Testing Program For Web Applications

As a web app developer, you have enough on your plate already. But with cybercrime on the rise – with 86% of companies experiencing at least one successful cyberattack in 2021 – it’s become more important than ever to test your own security … Read more

testing your data science model

May 2, 2022 by Emily Rollwitz

Security Testing 101: 9 Tried And Tested Ways to Find Security Flaws in Your Software

Software vulnerabilities can be devastating to your business. All it takes is one cyber attack or phishing scam to tarnish your reputation, bring your organization to a standstill, and prompt your customers to leave en-masse. After all, consumers … Read more

threat modeling, cybersecurity, PASTA, DREAD, STRIDE

April 27, 2022 by Norman Di Palo

Threat Modeling for Digital Applications: A Quick Guide

Threat Modeling is a security design process to identify potential threats that may impact web and mobile digital applications and determine the correct controls to produce effective countermeasures. Discover essential steps, concepts, and best … Read more

March 3, 2022 by David Lukic

7 Cybersecurity Threats You Must Know as a Web Developer

Technology and web development are constantly evolving. Right along with it, cybercriminals have become experts at devising new and sophisticated attack methods. Web developers need to understand how these attacks work so they can patch any … Read more

December 17, 2021 by Kate Priestman

Red Team vs Blue Team Exercise: Its Role in Finding Your Cybersecurity Flaws

What Is the Red Team Vs Blue Team Exercise?  The red team vs blue exercise is an industry-standard exercise for testing security processes. It originated from a military ‘wargames’ model. The strategy pits the teams against each other in … Read more

December 13, 2021 by David Maina

Automating Cybersecurity With Machine Learning

Artificial intelligence and its subfield machine learning play vital roles in cybersecurity today. It is not easy for a business to build robust cybersecurity systems without including these pieces of technology in its plans. Machine learning offers … Read more

7 Ways to Optimize SCADA Cybersecurity

September 17, 2021 by Emily Newton

7 Ways to Optimize SCADA Cybersecurity

As the name implies, Supervisory Control and Data Acquisition (SCADA) networks house critical systems — including computers and applications — that control, facilitate, or handle essential services. They’re used to manage many critical infrastructure … Read more

Why Has Web App Security Become a Major Concern in Recent Times

August 25, 2021 by Rushit Shah

Why Has Web App Security Become a Major Concern in Recent Times?

Web Application Security: Importance and Tools to Secure your Product  Web applications are being attacked and the number has just increased in recent times. There is an increase of more than 800% on web applications … Read more

October 13, 2020 by Cate Lawrence

Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities

Table Of ContentsFrom the theory of complex systems to ship securityThe challenge of ship securityThe problems are more complex than bad actors How easy is it to hack these ship systems? How is the maritime industry … Read more

developer coding

October 2, 2020 by Lorenzo Ermigiotti

4 Interesting Facts Your Hiring Team Should Know about Cybersecurity

As society continues to move more and more online, cybersecurity is becoming increasingly crucial to protecting your business. With the myriad of digital attacks threatening your online security and the integrity of your business, it's critical that … Read more

September 16, 2020 by Cate Lawrence

The Lifecycle of a Remote Code Execution Security Incident

It's not always easy to understand the trust value of a penetration testing until a critical security incident happens to you. Last year at Codemotion Rome,  Giovanni Mellini is Head of Information, systems, and network security at ENAV S.pA., … Read more

September 2, 2020 by Cate Lawrence

Security Is Not Just the Responsibility of the Security Manager

The following article was inspired by some of the best talks we had the opportunity to host during our offline conferences over the last few years. Together, they offer a broader view of the aspects related to Security. We have committed … Read more

August 26, 2020 by Cate Lawrence

Does open source software have a security problem?

You'd be hard-pressed to find a day where a cybersecurity incident doesn't hit the news, whether it's hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, … Read more

February 13, 2020 by Cate Lawrence

So you want to work in cybersecurity?

There's never been a better time to become a cybersecurity professional. Whether you're working for a bank, startup, government organization, or running your own business, cybersecurity as a career means you'll always be in demand. But how do you get … Read more

April 16, 2019 by Anastasiia Voitova

How using cryptography helps to reduce the attack surface on data

Hi, I’m Anastasiia Voitova and I gave a talk about cryptography and risk management at Codemotion Milan 2018. I am product engineer in cryptographic software company Cossack Labs – we create developer-friendly software to protect data and to help … Read more

Primary Sidebar

Learn new skills for 2023 with our Edu Paths!

Codemotion Edu Paths for 2023

Codemotion Talent · Remote Jobs

Game Server Developer

Whatwapp
Full remote · TypeScript · Kubernetes · SQL

Back-end Developer

Insoore
Full remote · C# · .NET · .NET-Core · Kubernetes · Agile/Scrum

Full Stack Developer

OverIT
Full remote · AngularJS · Hibernate · Oracle-Database · PostgreSQL · ReactJS

Data Engineer

ENGINEERING
Full remote · Amazon-Web-Services · Google-Cloud-Platform · Hadoop · Scala · SQL · Apache-Spark

Latest Articles

Pattern recognition, machine learning, AI algorithm

Pattern Recognition 101: How to Configure Your AI Algorithm With Regular Rules, Events, and Conditions

AI/ML

automotive software

Automotive Software Development: Can Agile and ASPICE Coexist?

DevOps

programming languages, 2023

Which Programming Languages Will Rule 2023?

Infographics

deceptive design, ux

Deceptive Patterns In UX Design – How To Avoid Them?

Design/UX

Footer

  • Magazine
  • Events
  • Community
  • Learning
  • Kids
  • How to use our platform
  • Contact us
  • Become a Contributor
  • About Codemotion Magazine
  • How to run a meetup
  • Tools for virtual conferences

Follow us

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube
  • RSS

DOWNLOAD APP

© Copyright Codemotion srl Via Marsala, 29/H, 00185 Roma P.IVA 12392791005 | Privacy policy | Terms and conditions

Follow us

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • RSS

DOWNLOAD APP

CONFERENCE CHECK-IN