New & Notable
Secure application development News
July 17, 2020
JFrog fills gaps in its DevOps platform with new features and partnerships with tool providers to help developers ship secure code and use issue-free open source code.
Secure application development Get Started
Bring yourself up to speed with our introductory content
Learn the four must-follow rules when introducing defense-in-depth to a distributed microservices architecture, especially when services traverse numerous networks and apps. Continue Reading
Independent and interoperable microservices require a permissions rethink, or you'll drive users crazy. Examine how tokens come into play for authentication and authorization. Continue Reading
Despite the benefits, microservices will introduce profound security issues. We review the biggest microservices security challenges and four strategies used to combat them. Continue Reading
Evaluate Secure application development Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security must be part of IT from the start and then continue through the entire product lifecycle -- design, build, release and maintenance. Consumers now demand it. Continue Reading
Compare and contrast the mobile testing tools from the big three cloud vendors -- AWS Device Farm, Google Firebase Test Lab and Microsoft Visual Studio App Center Test. Continue Reading
Manage Secure application development
Learn to apply best practices and optimize your operations.
While development teams should always strive to improve app functionality, unchecked collections of feature releases can quickly cause trouble. Feature toggles may be the answer. Continue Reading
Mobile apps carry their own set of code-based vulnerabilities and entry points, meaning developers need to step up their secure development, coding and deployment practices. Continue Reading
The flipside of microservices agility is the resiliency you can lose from service distribution. Here are some microservices resiliency patterns that can keep your services available and reliable. Continue Reading
Problem Solve Secure application development Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Get started on a vulnerability risk assessment process to prevent hacks on data, applications and more. Take these steps to identify vulnerabilities and improve risk management. Continue Reading
Middleware tools can present a huge vulnerability, enough to offset their benefits. However, with some simple steps you can protect yourself and your data. Continue Reading