How to Avoid SQL Injection in Your Code

SQL Injection is still one of the most common attack vectors in the wild. According to a recent report by Imperva’s security research team…

4 minute read

The Open Source Risk and How to Mitigate It

Open source software is ever growing, in number of projects and in adoption. The last decade has presented a massive and consistent growth…

5 minute read

Why You Should Shift Left Your Security

Are you tired of running after application owners to patch their vulnerable apps? Fixing vulnerable code in production takes months? Shift…

4 minute read

What is DevSecOps

Not too long ago, application security was the sole responsibility of the security team. It typically integrated at the end of the software…

3 minute read

The InfoSec Chronicles

Hi there, my name is Ori Zuckerman, I'm a Software Engineering Manager based in Tel Aviv. In the last 15 years I've been running software…

1 minute read