White Papers
- Next-Gen Application Security – HackerOne
- The Evolution of Application Security (And Where We Go Next) – Traceable.ai
E-Books
Sales Assets
Google Analytics
- The Pillars of Measurement Marketing – Planning
- My Funnel Doesn’t Work. What Went Wrong?
- How Marketers Can Communicate with Development Teams (Including Scripts)
DevOps/DevSecOps
- THE AWS SHARED RESPONSIBILITY MODEL: 3 AREAS OF IMPROVEMENT TO MAKE TODAY, PART 1
- Continuous Integration, Delivery, and Deployment Differentiated
- How to Market DevOps to Your Executives
- DevOps Security Means Moving Fast, Securely
- Security as Code: Why a Mental Shift is Necessary for Secure DevOps
Cloud
- THE AWS SHARED RESPONSIBILITY MODEL: 3 AREAS OF IMPROVEMENT TO MAKE TODAY, PART 1
- 7 Common Security Pitfalls to Avoid When Migrating to the Cloud
- How to Secure Your Feature-Flag-Based Application
- AWS Lambda: Your Quick Start Guide to Going Serverless
AppSec
- THE AWS SHARED RESPONSIBILITY MODEL: 3 AREAS OF IMPROVEMENT TO MAKE TODAY, PART 1
- 7 Common Security Pitfalls to Avoid When Migrating to the Cloud
- How to Secure Your Feature-Flag-Based Application
- DevOps Security Means Moving Fast, Securely
- Security as Code: Why a Mental Shift is Necessary for Secure DevOps
- Quick Tips for Better C# Security
- 5 Reasons You Need Application Security Champions
- Your Security Perimeter is a Living Cell, Not a Castle Wall
- The Developer’s Guide to Cryptography: Hash Functions and HMACs
- The Developer’s Guide to Cryptography: Why ASP.NET Core 2 Gets It Right
The Developer's Guide to Cryptography
- The Developer’s Guide to Cryptography: Hash Functions and HMACs
- The Developer’s Guide to Cryptography: Why ASP.NET Core 2 Gets It Right
- The Developer’s Guide to Cryptography: AES in Node.js
- The Developer’s Guide to Cryptography: Symmetric Encryption
- The Developer’s Guide to Cryptography: The Basics
.NET Development
- C# Enum: Definition, Examples, Best Practices, and Pitfalls
- A Look at .NET Core 2.1
- C# Array: Definition, Examples, Best Practices, and Pitfalls
- CQRS: Understanding from First Principles
- Quick Tips for Better C# Security
- The Developer’s Guide to Cryptography: Why ASP.NET Core 2 Gets It Right
- Application Security Tips Part 3–Protect Your Passwords
- Application security tips part 2 – SQL Injection
- Application Security Tips for New Developers–Series Introduction