Secure your code, from the start.


secure coding techniques

Coders Conquer Security Infrastructure as Code Series: Plaintext Storage of Passwords

18th May 2020

The key to most computer security these days involves passwords. Even if other security methods are employed, like two-factor authentication or biometrics, most organizations still employ password-based security as one element of their protection.…

Coders Conquer Security: Share & Learn Series - XML Injections

20th June 2019

XML injection attacks are nasty little exploits invented by hackers to help them compromise systems hosting XML databases. This includes the kinds of things that come to mind when one thinks about traditional databases - detailed stores of information about anything from medicines to movies.…