Java’s sun.misc.Unsafe is being phased out. Learn safer memory access using VarHandle and Foreign Function & Memory API to keep your applications secure and up-to-date.
-
Foojay Podcast #50: JCON Report, Part 2 – Maven, Software Security, Code Quality
This is part 2 of the interviews we recorded at the JCON conference earlier this month in Germany. In this episode, you get two main topics: Maven and Code Quality.
-
Foojay Podcast #36: J-Fall Report, Part 3
In this part, hear about Maven, contributing to Open Source projects, JOOQ, Desktop Applications, Thymeleaf, htmx, and Security.
-
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code
By taking a proactive approach to XSS prevention and using the right resources and tools, developers can help ensure the security and integrity of their Java web applications.
-
Making SBOMs, Threats, and Modelling Them a Piece of Cake!
The third article in a series on SBOMs, software supply chains, the government and you, introducing threat modelling and tools to help!
-
Make Your Security Policy Auditable
Learn how you can leverage OPA and Apache APISIX to move your authentication and authorization logic from the code to the infrastructure.
-
SBOMs and Software Composition Analysis
Let’s learn all about software composition analysis, how they work and why it is important for developers to get started as soon as possible!
-
Foojay Podcast #7: Security in Java, what do we need to know and how to keep our applications secure?
We invited Java security experts to dive into the fascinating world of secure coding and detecting vulnerabilities in your Java applications!
-
Learning by Auditing Kubernetes Manifests
Find out about Checkov, which scans cloud infrastructure configurations to find misconfigurations before they’re deployed.
-
How to do password hashing in Java applications the right way!
There are multiple ways to store sensitive passwords. And while having choices can be great, in the context of password storage, picking wrong can be a security nightmare. With that in mind, let’s hash out some of your options 🥁🥁.In this article …
-
Quick Fire Java: Java After Log4j
Watch a 10 minute discussion on Log4j, security processes and prioritization, and how Payara dealt with the vulnerability.