Sources and Sinks interviews security conference veteran Magno Logan

Photo by Alex Kotliarskyi on Unsplash

Using the Software Development Life Cycle (SDLC) as a model to secure your application

Photo by Glenn Carstens-Peters on Unsplash

Teach yourself computer science, cybersecurity, or anything, really

Photo by Carl Jorgensen on Unsplash

How to effectively teach yourself new…

And why missing documentation is a vulnerability.

Photo by Martin Adams on Unsplash

First of all, what even is Improper Assets Management?

Although “improper assets management” sounds complicated, it’s…

What every developer should do before they start writing code

Photo by Alexander Dummer on Unsplash

An introduction to stored cross-site scripting (XSS) vulnerabilities

Photo by RoonZ on Unsplash

What is XSS?

XSS is when an attacker can execute malicious scripts on a victim’s browser.

Sources and Sinks interviews car hacker and IoT security expert, Aaron Guzman

Photo by Hiroyoshi Urushima on Unsplash

The Unforgivable Sin in Development

How SQL injection and command injection happen in APIs

Photo by Ivan Diaz on Unsplash

Tracking your team’s productivity

Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store