Saoirse Hinksmon

Saoirse Hinksmon

Stay up to date on Application Security

Posts by Saoirse Hinksmon
  • 6 Reasons You Need to Run SCA Scans on…
    January 16, 2023 | By Saoirse Hinksmon

    We love open-source software (OSS). Not only does it save time and effort, but it’s also incredibly rewarding to collaborate with other developers on major projects. Plus, it opens the door for innovation that otherwise wouldn’t be possible at this scale. However, with code comes responsibility,…

    Read Article
     
  • What Is Software Supply Chain Security?
    May 11, 2022 | By Saoirse Hinksmon

    Most software today isn’t developed entirely from scratch. Instead, developers rely on a range of third-party resources to create their applications. By using pre-built libraries, developers don’t need to reinvent the wheel. They can use what already exists and spend time on proprietary code,…

    Read Article
     
  • How to Generate an SBOM in Veracode SCA
    April 25, 2022 | By Saoirse Hinksmon

    Emerging government regulations have driven the advancement of standards for securing software supply chains. The production of a Software Bill of Materials (SBOM) in a standard format is an increasing audit and compliance need for large organizations. Having an SBOM can help  Identify and avoid…

    Read Article
     
  • Testing OWASP’s Top 10 API Security…
    April 6, 2022 | By Saoirse Hinksmon

    Application Programming Interface (API) attacks are set to become one of the most prevalent cyberattacks with a broad target range. By nature, APIs expose application logic and sensitive data such as personally identifiable information (PII), causing APIs to become a target for attackers. In 2019,…

    Read Article
     
  • New in Security Labs: Kotlin &…
    February 28, 2022 | By Saoirse Hinksmon

    Secure coding with Kotlin & Swift  This week we’ve added new Kotlin & Swift Courses to the Security Labs catalog! The update includes 4-5 Kotlin (Android) labs and 4 Swift (iOS) labs that cover common mobile security topics such as secret storage, authorization, and custom URL handling. …

    Read Article