Home
Docs
GitHub
Pricing
Blog
Log In
Categories

Sandworm Knowledge Base

Secure Use of Third-Party Libraries

Open Source Risks
Third-party libraries are fundamental building blocks in modern application development. They offer a shortcut to functionality, saving time and effort. However, their use can also introduce security vulnerabilities if not managed properly.

Best Practices for Open Source Governance

Open Source Risks
In the realm of web application development, open source software (OSS) is the backbone, providing a vast repository of resources. However, harnessing the power of open source code while ensuring security, compliance, and efficiency demands careful governance.

Supply Chain Security Explained

Introduction to Security
Supply chain security encompasses a range of practices and measures designed to protect software applications and systems from vulnerabilities, attacks, and unauthorized access.

OWASP Top Ten Vulnerabilities

Introduction to Security
The OWASP Top Ten is a regularly updated list of the most critical web application security risks. It serves as a guide for developers and security practitioners to focus their efforts on addressing common vulnerabilities that could lead to security breaches.

Overview of Security Principles

Introduction to Security
Security is a complex landscape, and no single measure can guarantee protection against all threats. To create a robust security posture, organizations must adopt a multilayered defense strategy.

Open Source Security Fundamentals

Introduction to Security
Open source software (OSS) plays a pivotal role in modern software development. Its accessibility, cost-effectiveness, and collaborative nature have made it a staple in countless applications and systems. However, harnessing the power of open source software also comes with its unique set of security considerations.

Importance of Application Security

Introduction to Security
Software applications, regardless of their complexity, can have vulnerabilities. These vulnerabilities can be exploited by malicious actors to gain unauthorized access, disrupt services, or compromise data integrity.
17 articles