Supply Chain Threats 101 The recent vulnerability found in the xz library puts the spotlight on a topic that often receives less interest than it should: threats on the Supply Chain. As usual, the first thing to do when we don’t address … Read more
Cybersecurity
Discover the Latest Trends and Dive into Top Articles on Cybersecurity in the Comprehensive Archives of Codemotion Magazine. In today's rapidly evolving digital landscape, staying informed about the ever-growing realm of cybersecurity is paramount. Codemotion Magazine, a trusted source for tech enthusiasts and professionals, is your gateway to explore the most current trends, cutting-edge strategies, and thought-provoking insights in the field of cybersecurity.
How to Prevent a Cross-Site Scripting Attack (XSS)
A Hacker One report showed that XSS attacks were the top vulnerability in recent years. You might be thinking, if XSS is such a common problem, then I probably don’t need to worry about it. But don’t be complacent. Cross-site scripting attacks can be … Read more
What are Supply Chain Attacks and Why Should Developers Care?
What are Supply Chain Attacks? Supply chain attacks, also known as third-party attacks, occur when cybercriminals infiltrate your system through an outside partner or provider with access to your systems and data. The attacker's goal is to … Read more
Top 10 Advanced International Cybersecurity Certifications
Cybersecurity professionals are in high demand. In fact, the (ISC)² 2023 Cybersecurity Workforce Study found that there is a global shortage of 3.4 million cybersecurity professionals. This shortage is expected to grow to 6.5 million by 2025. … Read more
All You Need to Know About OIDC Authentication
What Is OIDC? OIDC stands for OpenID Connect, a simple identity layer that works on top of the OAuth 2.0 protocol. It allows clients to verify the identity of the end-user based on the authentication performed by an authorization server. In … Read more
Container Images: Technical Refresher and Security Best Practices
Image by Freepik. What Are Container Images? A container image is a lightweight, stand-alone, executable software package that includes everything required to run a piece of software, including the code, a runtime, libraries, system … Read more
What is Just-In-Time (JIT) Permission Management, and Why is it Essential?
Have you ever experienced the frustration of discovering an unexpected charge on your bank statement for a forgotten gym membership? Perhaps you kept it active "just in case" you wanted to exercise someday. Similarly, always-on privileged access, … Read more
The Life of Kevin Mitnick: The World’s Most Famous Hacker
While hacking is deemed illegal, there are still hackers who manage to leave a mark in the industry. Perhaps the most prominent figure in the world of hacking is Kevin Mitnick, a man whose decades-long career as a computer hacker earned him worldwide … Read more
Azure Security: Essential Tools and Best Practices
The rise of cloud platforms like Microsoft Azure has brought many benefits to the computer and software industry. With on-demand services, easy scalability, hybrid storage options and a huge range of tools, the cloud has opened up the landscape for … Read more
How to Improve Programmable Logic Devices’ Security: Main Threats and Latest Advancements
Differences between PLDs and FPGAs Field Programmable Gate Arrays (FPGAs) are integrated circuits that can be programmed and reprogrammed to perform a wide range of digital functions. They are designed to be flexible and customizable, making them … Read more
5 Tips for Boosting API Security
Get ready to boost your API security! Did you know that every API you publish is like punching a hole in your company's security blanket? With all that sensitive data now exposed to the internet, it's more important than ever to nail down data flows, … Read more
3 Data Breaches in Web Applications and Lessons Learned
What Is a Data Breach? A data breach is a cyberattack in which sensitive, confidential or protected data is accessed or exposed in an unauthorized manner. If sensitive data is viewed or directly stolen by unauthorized persons, the organization … Read more
Multi-Layered Defense for Web Applications
What Is Web Application Security? A web application is an application that is stored on a remote server and delivered over the Internet, typically through a browser interface. Web application security is complex, because web applications are … Read more
How to Prevent Data Loss: 13 Best Practices and Strategies
According to a report by Information Security Buzz, ransomware attacks during Black Friday 2021 rose to a staggering 495 million globally. With Black Friday 2022 just around the corner, experts predict there will be a new record this year. With … Read more
Zero-Trust Model and Secretless Approach: A Complete Guide
As organizations shift more of their workloads and data to the cloud, they face new security challenges. The cloud presents a unique set of challenges for security teams, who must now deal with a more complex and dynamic attack surface. One of these … Read more
5 Things You Cannot Miss When Setting Up Your Cloud Security Checklist
The adoption of cloud-based software, platforms and infrastructure has expanded massively in recent years and the trend looks set to continue. Cloud infrastructure services, for example, are forecast to grow by 30.5% in 2023 compared to 2022. It's no … Read more
Security First: Getting Started With Minimum Secure Products
Minimum Secure Products or Minimum Viable Secure Product (MVSP) are guidelines and criteria for creating enterprise or market-ready solutions or services. It consists of a checklist with best practices to follow. The objective is to ensure that B2B … Read more
Tips to Deliver a Strong Cybersecurity Assessment Report
When done correctly, security assessment reports reduce risk and enable businesses to decide where to improve their cyber defenses. In essence, a security assessment report contains conclusions and suggestions. It concerns weaknesses in an IT … Read more
How to Implement a Security Testing Program For Web Applications
As a web app developer, you have enough on your plate already. But with cybercrime on the rise – with 86% of companies experiencing at least one successful cyberattack in 2021 – it’s become more important than ever to test your own security … Read more
Security Testing 101: 9 Tried And Tested Ways to Find Security Flaws in Your Software
Software vulnerabilities can be devastating to your business. All it takes is one cyber attack or phishing scam to tarnish your reputation, bring your organization to a standstill, and prompt your customers to leave en-masse. After all, consumers … Read more