GitHub Copilot & Advanced Security : The...
ShiftLeft Blog
by
3M ago
GitHub Copilot, the AI-powered coding assistant, has emerged as a game-changer in the software development landscape. By harnessing the power of generative AI, Copilot promises to accelerate coding tasks, boost developer productivity, and even democratize coding by making it more accessible to newcomers. However, as with any transformative technology, there are caveats. In Copilot’s case ..read more
Visit website
Revolutionizing Vulnerability Detection and Patching
ShiftLeft Blog
by
4M ago
In the ever-evolving landscape of software development, ensuring the security of applications has become a paramount concern. As cyber threats continue to grow in sophistication, it is crucial for developers and security professionals to stay ahead of the curve. This article explores a groundbreaking approach that combines the power of Code Property Graphs (CPGs) and ..read more
Visit website
The Qwiet AI Code Doctor Will See...
ShiftLeft Blog
by
4M ago
Qwiet AI and the ancient Greek physicians like the father of medicine Hippocrates have much in common. Hippocrates highlighted the significance of a healthy diet and lifestyle in preventing diseases and acknowledged the root cause of physical and psychological ailments as diet and lifestyle choices (Διαιτήμασί in Greek), and now Qwiet AI is delivering his ..read more
Visit website
Why Is Vulnerability Remediation Hard?
ShiftLeft Blog
by
5M ago
Imagine yourself standing in a local fair at night. The bright lights from the games beckon you, and you see your favorite game, the one you’re best at – Whack-A-Mole. You excitedly walk up to the booth, plunk down your few dollars, and get ready to whack a bunch of plastic, animatronic moles back into ..read more
Visit website
What are the limitations of using ChatGPT…
ShiftLeft Blog
by
5M ago
Love them or hate them, large language models (LLM) are here to stay. After opening the Pandora’s Box of ChatGPT in late 2022, everyone from developers to grandmas began using the tool to get the answers they wanted – and fast. As with every other new technology, ChatGPT created a new set of security risks ..read more
Visit website
AppSec 101 – Cross-Site Scripting (XSS)
ShiftLeft Blog
by
5M ago
Introduction Did you know that a simple website visit could put your personal information at risk? In this article, we explain how a common online threat called XSS can cause big problems and show you ways to keep your application secure.  What is Cross-Site Scripting (XSS)? Cross-site scripting (XSS) is a significant web security vulnerability ..read more
Visit website
AppSec 101 – Session Management
ShiftLeft Blog
by
5M ago
Introduction How does a website recall your digital footprints during each visit? This article dives into session management, the silent guardian of web navigation, ensuring our virtual moves are remembered and protected. You’ll be equipped with essential insights on maintaining secure and fluid online experiences through robust session management practices. What is Session Management?   ..read more
Visit website
AppSec 101 – Cross-Site Request Forgery (CSRF)
ShiftLeft Blog
by
5M ago
Introduction Imagine clicking a link and unintentionally giving a cyber thief access to your data. This article dives into the silent threat of CSRF, where your trusted web session becomes a hacker’s tool. You’ll learn what CSRF is, how it operates, and how you can protect against its deceptive maneuvers. What is Cross-Site Request Forgery ..read more
Visit website
Understanding XSS vs CSRF
ShiftLeft Blog
by
5M ago
When it comes to web application vulnerabilities and attacks, malicious actors are a lot like Cookie Monster, screaming, “Me love cookie!” Digital cookies may not be as tasty as chocolate chips, but they’re just as deliciously enticing because they often contain sensitive information or enable attackers to gain unauthorized access.  While both Cross-Site Scripting (XSS ..read more
Visit website
AppSec 101 – Input Validation
ShiftLeft Blog
by
5M ago
Introduction Ever wondered what separates a secure application from a vulnerable one from a developer’s perspective? It often boils down to how well you handle user inputs. In this blog, we dive into input validation, an essential yet sometimes overlooked aspect of coding for security. It’s a straightforward guide on the why, how, and what ..read more
Visit website

Follow ShiftLeft Blog on FeedSpot

Continue with Google
Continue with Apple
OR