Development

Grok AI Explained: A Simple Guide to Elon Musk’s AI Assistant
Elon Musk's Grok AI isn't just another chatbot—it accesses real-time data from X, and uses massive computational power to challenge ChatGPT. This guide breaks down everything from Grok's technical capabilities to its ...

Bluesky AT Protocol: Building a Decentralized TikTok
The Bluesky AT Protocol aims to decentralize social media, empowering users with control over their data and interactions. By shifting power away from centralized platforms like TikTok, it paves the way for ...

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in ...

Comprehensive Guide to API Error Code Management
Mastering API error codes is essential for building robust and user-friendly applications. This comprehensive guide explores best practices for handling and documenting errors, ensuring clear communication between your API and its users ...
Python Security: Safeguarding our Code
Malicious Python security packages on PyPI and Git-Hub are the snake in the grass for security teams and developers  The Rise of Python Security Exploits   The Python Package Index (PyPI) and Git-Hub ...

Accurate, Useful Risk Scoring Demands Business Risk Observability
Delivering exceptional, secure application experiences means application development and security teams need visibility into the entire IT estate and ruthless prioritization. Detecting vulnerabilities is not enough. They need to see which vulnerabilities ...
What Is GitOps and How Will it Impact Digital Forensics?
GitOps is arguably the hottest trend in software development today. It is a new work model that is widely adopted due to its simplicity and the strong benefits it provides for development ...

Malware Evolves to Present New Threats to Developers
Malware, or code written for malicious purposes, is evolving.Photo by Cécile Brasseur on UnsplashSoftware developers face new threats from malicious code as their tools and processes have proven to be an effective and ...

Apollo 2.0 — New Year, New Features
Apollo 2.0 — New Year, New FeaturesIntroductionAt the beginning of 2020, I took my first real foray into programming. Inspired by Cody Thomas’s Mythic, I undertook to, what was unbeknownst to me at the time, ...

API Security 101: Broken Object Level Authorization
An API Objects Free-For-AllPhoto by CHUTTERSNAP on UnsplashI got really into studying API security recently. While working on the first draft of my book, my technical editor, Aaron Guzman, pointed out that my ...