Security in Software Development Process / PART 2: Hints for developers

Stepwise · Intermediate ·🔐 Cybersecurity ·4y ago
Our video series with Stepwise developers and mentors! They are unique and talented people who have extensive knowledge in their fields and our areas of activity. From Custom Software Development, through Cloud, Security and Test Automation topics, to individual programming languages and frameworks! They decided to share this knowledge with you :) Software Development Life Cycle is defined as a systematic approach used by the software industry to design, develop, and test high-quality software. The main goal behind SDLC is to produce high-quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates. This is the second part of very important topic: Security in Software Development Process, by Radek Grębski - Stepwise CTO. See our recommendations from design phase through commits to deployment and maintenance. See how you can utilize good practices (eg: OWASP) and tools (WAFs, Trivy, sops) in order to make your Software Development Process more secure. If you are looking for a job as a developer - write to us! We'd love to hear from you. Check also open recruitments - we are still looking for new talents! https://stepwise.pl/careers/
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Why Businesses Quietly Accept Technology Friction as “Normal”
Businesses often accept technology friction as normal, but it can have significant impacts on productivity and security
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
AI models from public repositories can pose a significant threat to enterprise security due to poisoned weights, and learning to defend against them is crucial
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Backdoored AI models are prevalent on Hugging Face, posing a significant security risk to the AI supply chain, and it's crucial to secure it
Medium · Cybersecurity
The XSS Escalation Playbook: From Basic Reflection to DOM Breakouts
Learn to escalate XSS attacks from basic reflection to DOM breakouts with this comprehensive playbook
Medium · Cybersecurity
Up next
VPC Service Controls: Day Two Operations
Google Cloud
Watch →