shinksmon
Saoirse
Hinksmon
Saoirse Hinksmon
/sites/default/files/styles/medium/public/default_images/01-og.png?itok=DTioMS4G

Saoirse Hinksmon

Stay up to date on Application Security

Posts by Saoirse Hinksmon
  • shinksmon /blog/secure-development/what-software-supply-chain-security What Is Software Supply Chain Security? Most software today isn’t developed entirely from scratch. Instead, developers rely on a range of third-party resources to create their applications. By using pre-built libraries, developers don’t need to reinvent the wheel. They can use what already exists and spend time on proprietary code,… May 11, 2022 /sites/default/files/styles/blog_listing_image/public/default_images/default_fullsize_image_1600x800_Generic_2.png?itok=pwd4r3nd Secure Development Saoirse Hinksmon Saoirse Hinksmon /sites/default/files/styles/blog_landing_featured_image/public/default_images/default_fullsize_image_1600x800_Generic_2.png?itok=uOKXvNb3 /sites/default/files/default_images/default_fullsize_image_1600x800_Generic_2.png
  • shinksmon /blog/managing-appsec/how-generate-sbom-veracode-sca How to Generate an SBOM in Veracode SCA Emerging government regulations have driven the advancement of standards for securing software supply chains. The production of a Software Bill of Materials (SBOM) in a standard format is an increasing audit and compliance need for large organizations. Having an SBOM can help  Identify and avoid… April 25, 2022 /sites/default/files/styles/blog_listing_image/public/default_images/default_fullsize_image_1600x800_Generic_2.png?itok=pwd4r3nd Managing AppSec Saoirse Hinksmon Saoirse Hinksmon /sites/default/files/styles/blog_landing_featured_image/public/default_images/default_fullsize_image_1600x800_Generic_2.png?itok=uOKXvNb3 /sites/default/files/default_images/default_fullsize_image_1600x800_Generic_2.png
  • shinksmon /blog/managing-appsec/testing-owasps-top-10-api-security-vulnerabilities-part-1 Testing OWASP’s Top 10 API Security… Application Programming Interface (API) attacks are set to become one of the most prevalent cyberattacks with a broad target range. By nature, APIs expose application logic and sensitive data such as personally identifiable information (PII), causing APIs to become a target for attackers. In 2019,… April 6, 2022 /sites/default/files/styles/blog_listing_image/public/default_images/default_fullsize_image_1600x800_Generic_2.png?itok=pwd4r3nd Managing AppSec Saoirse Hinksmon Saoirse Hinksmon /sites/default/files/styles/blog_landing_featured_image/public/default_images/default_fullsize_image_1600x800_Generic_2.png?itok=uOKXvNb3 /sites/default/files/default_images/default_fullsize_image_1600x800_Generic_2.png
  • shinksmon /blog/secure-development/new-security-labs-kotlin-swift-mobile-courses New in Security Labs: Kotlin &… Secure coding with Kotlin & Swift  This week we’ve added new Kotlin & Swift Courses to the Security Labs catalog! The update includes 4-5 Kotlin (Android) labs and 4 Swift (iOS) labs that cover common mobile security topics such as secret storage, authorization, and custom URL handling. … February 28, 2022 /sites/default/files/styles/blog_listing_image/public/programming%20language.jpg?itok=zHQVtR8t Secure Development Saoirse Hinksmon Saoirse Hinksmon /sites/default/files/styles/blog_landing_featured_image/public/programming%20language.jpg?itok=M7GEhJq9 /sites/default/files/programming%20language.jpg