Latest post
🚀 Stop The Trojan Horse in Your pom.xml: SonarQube Advanced Security (Part 3)
Table of Contents Problem #1: “I didn’t write this bug, why is it my problem?”Problem #2: “The Dependency Hell” (Transitive Dependencies) 🔥Problem #3: “Wait, I can’t use this library? It’s open source!” ⚖️Problem #4: “The Sneaky Attack” (Advanced SAST & …
-
Foojay Podcast #58: How Java Developers Can Secure Their Code
Table of Contents VideoPodcast AppsGuestsJonathan VilaBrian VermeerErik CostlowContent Three years after Log4Shell caused a significant security issue, we still struggle with insecure dependencies and injection problems. In this podcast, we’ll discuss how developers can secure their code. I talked with …
1-2 of 2