Sources and Sinks interviews security conference veteran Magno Logan

Photo by Alex Kotliarskyi on Unsplash


Using the Software Development Life Cycle (SDLC) as a model to secure your application

Photo by Glenn Carstens-Peters on Unsplash


Teach yourself computer science, cybersecurity, or anything, really

Photo by Carl Jorgensen on Unsplash

How to effectively teach yourself new…


And why missing documentation is a vulnerability.

Photo by Martin Adams on Unsplash

First of all, what even is Improper Assets Management?

Although “improper assets management” sounds complicated, it’s…


What every developer should do before they start writing code

Photo by Alexander Dummer on Unsplash


An introduction to stored cross-site scripting (XSS) vulnerabilities

Photo by RoonZ on Unsplash

What is XSS?

XSS is when an attacker can execute malicious scripts on a victim’s browser.


Sources and Sinks interviews car hacker and IoT security expert, Aaron Guzman

Photo by Hiroyoshi Urushima on Unsplash


The Unforgivable Sin in Development


How SQL injection and command injection happen in APIs

Photo by Ivan Diaz on Unsplash


Tracking your team’s productivity

Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store