What’s the relation between Mathematica’s authentication keys called MathID, activation key, and password?

I’m curious about how desktop softwares’ installation authentication/validation process work in general, and hopefully apply it to softwares I make. But to start with a specific example, consider Mathematica’s off-Internet installation pro… Continue reading What’s the relation between Mathematica’s authentication keys called MathID, activation key, and password?

Software Engineers Could Get 30% Time Back Thanks To Generative AI

Generative AI has the potential to automate between 60% to 70% of the work that most of us engage in every day. But for many knowledge workers, generative AI tools are likely to help take back time spent on administrative tasks, freeing up their days f… Continue reading Software Engineers Could Get 30% Time Back Thanks To Generative AI

How to do R&D with rapidly changing open source software libraries and APIs in the presence of sensitive data while maintaining ISO27001 compliance

I do research and development at an ISO27001 certified company that makes enterprise software. As such, I work from an isolated environment so that I can experiment with non-IT-approved software programs and libraries, as well as APIs (i…. Continue reading How to do R&D with rapidly changing open source software libraries and APIs in the presence of sensitive data while maintaining ISO27001 compliance

Planing the security for a public web application, any feedback?

I’ve been working long time on a web application, consisting of a large amount of data and many services and also communicating with external services.
Now that I’m very happy with the functionality and reliability, before moving from an … Continue reading Planing the security for a public web application, any feedback?

How AI and ML are changing software engineering

Current machine learning models that are designed to generate code will enhance developer productivity, according to this Gartner analyst.
The post How AI and ML are changing software engineering appeared first on TechRepublic.
Continue reading How AI and ML are changing software engineering

What are some ways to ensure that a cryptography library is reliable in an ecosystem that is new to me?

Cryptography is a core security service, and is generally considered a specialty that is difficult to get right unless one knows what they are doing. Furthermore, cryptography API misuse is rampant and the cause of many security vulnerabil… Continue reading What are some ways to ensure that a cryptography library is reliable in an ecosystem that is new to me?

What are Command Injection vulnerabilities?

How command injection vulnerabilities allow attackers to take over your machine, and how you can prevent these vulnerabilities.
Photo by Athul Cyriac Ajay on Unsplash
Command injection vulnerabilities are probably one of the most dangerous vulnerabilit… Continue reading What are Command Injection vulnerabilities?

5 Steps to improving your Secure Scorecard

Improve the security of your software development pipeline by following these five simple steps
Photo by Markus Winkler on Unsplash
The Secure Scorecard project, established by the Open Source Security Foundation (OpenSSF), sets out a series of eightee… Continue reading 5 Steps to improving your Secure Scorecard