Skip to content
No results
  • Home
  • About Us
  • Blog
  • Bootcamp
  • Contact Us
Secure Coding Practices
  • Home
  • About Us
  • Blog
  • Bootcamp
  • Contact Us
Secure Coding Practices
  • Secure Coding in Java, Language-Specific Secure Coding, Practice

Avoid XXE Attacks in Java XML Parsers: Essential Security Measures

Avoid XXE Attacks in Java XML Parsers

XML External Entity (XXE) attacks exploit vulnerable Java XML parsers, potentially exposing sensitive data and system files. These attacks target misconfigured parsers that blindly process external entities, a feature most applications don’t actually need. Developers can block XXE attacks by…

  • Leon I. Hicks
  • April 29, 2025
  • Secure Coding in Java, Lessons

Spring Security Best Practices Configuration for Enhanced Protection

Spring Security Best Practices Configuration

Spring Security’s configuration mistakes can leave apps wide open to attacks, and most devs get it wrong on day one. The framework’s default settings aren’t enough for production systems – they’re just a starting point. You’ll need proper password encoding…

  • Leon I. Hicks
  • April 28, 2025
  • Secure Coding in Java, Language-Specific Secure Coding, Practice

Easy Java Cryptography API Usage Examples

Overhead view of a workspace filled with various digital tools and accessories, indicating a productive and collaborative work setting.

Secure data handling matters in software development. The Java Cryptography API (JCA) offers essential tools for encryption, decryption, signing, and managing keys.  For instance, developers can utilize the Cipher class for AES encryption, or the KeyPairGenerator for creating a pair…

  • Leon I. Hicks
  • April 27, 2025
  • Language-Specific Secure Coding, Practice, Secure Coding in Java

Secure File Handling Java NIO: Best Practices Guide

a computer workstation with one screen displaying a picturesque mountain road and the other showcasing complex programming code, indicating a guide or tutorial focused on secure file management using Java NIO.

Keeping files secure while coding in Java is really important. Java NIO (New I/O) gives developers some handy tools for file management, but it also requires careful handling.  You gotta be mindful about things like checking file paths and setting…

  • Leon I. Hicks
  • April 26, 2025
  • Secure Coding in Java, Practice

Java Deserialization Vulnerability Mitigation Guide

Java Deserialization Vulnerability Mitigation

Java deserialization flaws rank among the nastiest bugs in enterprise apps. When systems convert serialized data back into objects, attackers slip in malicious code that executes with the app’s privileges. Think of it like a corrupted save file in a…

  • Leon I. Hicks
  • April 25, 2025
  • Secure Coding in Java, Practice

Prevent Java SQL Injection PreparedStatement Techniques

Prevent Java SQL Injection PreparedStatement

SQL injection remains a persistent threat, hitting Java applications where it hurts – right in the database. PreparedStatement stands as Java’s first line of defense, automatically sanitizing user inputs before they reach SQL queries. Unlike regular Statement objects that directly…

  • Leon I. Hicks
  • April 24, 2025
  • Language-Specific Secure Coding, Lessons, Secure Coding in Java

Java Secure Coding Guidelines OWASP Explained Fast

The dense, intricate coding displayed across the entire screen gives the impression of an immersive, complex programming environment, where developers might work on advanced software applications or systems. Credits: pixabay.com (Photo by Boskampi)

Java developers often miss security while coding, a big mistake that can expose sensitive data. The OWASP (Open Web Application Security Project) offers guidelines to prevent common issues that haunt developers, covering SQL injection, cross-site scripting, and weak authentication practices. …

  • Leon I. Hicks
  • April 23, 2025
  • Language-Specific Secure Coding, Secure Coding in Java

Unlock the Secrets of Secure Coding in Java for Developers

The blend of data, light, and movement could be seen as a conceptual depiction of the inner workings of an advanced artificial intelligence system.

Cyber threats evolve daily, and secure coding is a must have skill for Java developers. Writing code that just works isn’t enough; it must also protect users and their data from attacks. Early on, many underestimate security. The first real…

  • Leon I. Hicks
  • April 22, 2025
  • Language-Specific Secure Coding

Language-Specific Secure Coding: Protect Your Codebase Effectively

Language-Specific Secure Coding

We’ve seen what bad code can do. Doesn’t matter the language, C++ trips on buffer overflows, PHP lets SQL injections slip through the cracks. After 15 years picking through the wreckage, we’ve figured something out: Language-Specific Secure Coding isn’t optional.…

  • Leon I. Hicks
  • April 21, 2025
  • Developer Best Practices

Keep Dependencies Up to Date — Without Breaking Your App

Outdated libraries can introduce security flaws. Learn how to safely update dependencies and stay ahead of vulnerabilities. In modern software development, dependencies are essential components that help you avoid reinventing the wheel. However, relying on third-party libraries and packages means…

  • Leon I. Hicks
  • April 16, 2025
Prev
1 … 35 36 37 38 39
Next

Copyright © 2026