Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 102: Secure Coding Best Practices for Analysts

15:13
 
Share
 

Manage episode 494503747 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

You don’t need to be a developer to influence secure code—but you do need to understand what secure coding looks like. In this episode, we break down the most important secure development practices that analysts should know when evaluating application risk or reviewing vulnerability reports. Topics include input validation, output encoding, secure session management, proper authentication handling, and safe data storage.

We also explore the role of parameterized queries in preventing injection attacks, and how analysts can spot common coding patterns that introduce vulnerabilities. Whether you're working with developers, reviewing scanner output, or helping write security requirements for new applications, this episode equips you to ask the right questions—and guide teams toward code that is resilient against attack. Brought to you by BareMetalCyber.com

  continue reading

130 episodes

Artwork
iconShare
 
Manage episode 494503747 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

You don’t need to be a developer to influence secure code—but you do need to understand what secure coding looks like. In this episode, we break down the most important secure development practices that analysts should know when evaluating application risk or reviewing vulnerability reports. Topics include input validation, output encoding, secure session management, proper authentication handling, and safe data storage.

We also explore the role of parameterized queries in preventing injection attacks, and how analysts can spot common coding patterns that introduce vulnerabilities. Whether you're working with developers, reviewing scanner output, or helping write security requirements for new applications, this episode equips you to ask the right questions—and guide teams toward code that is resilient against attack. Brought to you by BareMetalCyber.com

  continue reading

130 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play