5 Kubernetes Security Best Practices

GUEST POST

Author Gilad David Maayan

What is Kubernetes Security?

Kubernetes is an open source platform that helps you orchestrate Linux containers and manage microservices architecture across public, private, and hybrid clouds. Kubernetes involves deploying a cluster composed of different layers and services, such as worker nodes, pods, and containers. This complex architecture, which changes frequently as Kubernetes becomes a foundation for modern software deployment, creates a large, dynamic attack surface.

Continue reading

What’s new in C# 11: overview

C# 11 is coming, so we’re going to explore its new features in detail. You may find these new features pretty curious even though there are not that many of them. Today let’s take a closer look at the generic math support, raw string literals, the required modifier, the type parameters in attributes, and more.

Continue reading

50 terrible coding tips for a C++ developer

I write articles about static analysis methodology and issues of creating high-quality code. But I wanted to fool around a bit. So please, welcome the article with 50 terrible coding tips. However, if you have more ideas how to create sh*tcode — share them in the comments. There’s a chance that I’ll post a new article and there might be 100 terrible coding tips :).

Continue reading

4 Free Code Scanning Tools to Boost Code Quality and Security

GUEST POST

Author Gilad David Maayan

What is Code Scanning?

Code scanning tools help identify potential security issues in applications before it reaches production. The goal is to minimize security error risks, ensuring teams can apply fixes in early phases when it is less difficult and more cost-effective.

Continue reading

Secure Coding: Best Practices and Tech to Secure Your Code

GUEST POST

Author Gilad David Maayan

What Is Secure Coding?

Secure coding is the practice of integrating protective measures and vulnerability remediation into the software development process. It enables developers to account for vulnerabilities and security issues during all phases of the software development lifecycle. 

Continue reading