<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Devsecurely</title>
	<atom:link href="https://www.devsecurely.com/feed" rel="self" type="application/rss+xml" />
	<link>https://www.devsecurely.com/blog</link>
	<description>A blog to spread the security light</description>
	<lastBuildDate>Wed, 16 Oct 2024 06:03:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.1</generator>

<image>
	<url>https://www.devsecurely.com/blog/wp-content/uploads/2023/12/favicon.png</url>
	<title>Devsecurely</title>
	<link>https://www.devsecurely.com/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to win money and influence your superiors</title>
		<link>https://www.devsecurely.com/blog/2024/10/how-to-win-money-and-influence-your-superiors?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-win-money-and-influence-your-superiors</link>
					<comments>https://www.devsecurely.com/blog/2024/10/how-to-win-money-and-influence-your-superiors#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Wed, 16 Oct 2024 06:03:43 +0000</pubDate>
				<category><![CDATA[IT governance]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=571</guid>

					<description><![CDATA[<p>When I understood this simple concept, I was able to become a beast. I used to be a pentester for a consultancy firm. And every year, they gave me...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/10/how-to-win-money-and-influence-your-superiors">How to win money and influence your superiors</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/10/how-to-win-money-and-influence-your-superiors/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Protecting your baby: The SAFER Framework for Secure Coding</title>
		<link>https://www.devsecurely.com/blog/2024/09/protecting-your-baby-the-safer-framework-for-secure-coding?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-your-baby-the-safer-framework-for-secure-coding</link>
					<comments>https://www.devsecurely.com/blog/2024/09/protecting-your-baby-the-safer-framework-for-secure-coding#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Mon, 23 Sep 2024 08:25:11 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[checklist]]></category>
		<category><![CDATA[Logical vulnerabilities]]></category>
		<category><![CDATA[SAFER]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=520</guid>

					<description><![CDATA[<p>In that dimly lit hospital room, I lifted that small and fragile baby. Even though my wife just gave birth to him, I instinctively loved him. I vowed to...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/09/protecting-your-baby-the-safer-framework-for-secure-coding">Protecting your baby: The SAFER Framework for Secure Coding</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/09/protecting-your-baby-the-safer-framework-for-secure-coding/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Password policy: a complete guide to protecting your users</title>
		<link>https://www.devsecurely.com/blog/2024/08/password-policy-a-complete-guide-to-protecting-your-users?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=password-policy-a-complete-guide-to-protecting-your-users</link>
					<comments>https://www.devsecurely.com/blog/2024/08/password-policy-a-complete-guide-to-protecting-your-users#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Fri, 30 Aug 2024 20:26:55 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=433</guid>

					<description><![CDATA[<p>Some break-ins happened in your neighborhood. So, you decided to turn your house into a fortress. You fortified the walls, installed alarm systems on all the windows and bought...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/08/password-policy-a-complete-guide-to-protecting-your-users">Password policy: a complete guide to protecting your users</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/08/password-policy-a-complete-guide-to-protecting-your-users/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A complete guide to secure user account management</title>
		<link>https://www.devsecurely.com/blog/2024/08/a-complete-guide-to-secure-user-account-management?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-complete-guide-to-secure-user-account-management</link>
					<comments>https://www.devsecurely.com/blog/2024/08/a-complete-guide-to-secure-user-account-management#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Fri, 30 Aug 2024 09:36:19 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[checklist]]></category>
		<category><![CDATA[hash]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[session]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=499</guid>

					<description><![CDATA[<p>Imagine putting on a fake mustache, stepping into a company pretending to be the CEO, and firing everyone. Or, imagine putting on a sexy grin, going into MI6 offices...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/08/a-complete-guide-to-secure-user-account-management">A complete guide to secure user account management</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/08/a-complete-guide-to-secure-user-account-management/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A complete guide to secure password storage</title>
		<link>https://www.devsecurely.com/blog/2024/07/a-complete-guide-to-secure-password-storage?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-complete-guide-to-secure-password-storage</link>
					<comments>https://www.devsecurely.com/blog/2024/07/a-complete-guide-to-secure-password-storage#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Thu, 04 Jul 2024 16:34:06 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[bruteforce]]></category>
		<category><![CDATA[hashing]]></category>
		<category><![CDATA[pepper]]></category>
		<category><![CDATA[rainbow table]]></category>
		<category><![CDATA[salt]]></category>
		<category><![CDATA[secure password storage]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=266</guid>

					<description><![CDATA[<p>I was staring blankly at my screen in disbelief. My heart was racing, and my fingers were shaking. My alarm clock was ringing, but it didn’t even make me...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/07/a-complete-guide-to-secure-password-storage">A complete guide to secure password storage</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/07/a-complete-guide-to-secure-password-storage/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CORS: the ultimate guide</title>
		<link>https://www.devsecurely.com/blog/2024/06/cors-the-ultimate-guide?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cors-the-ultimate-guide</link>
					<comments>https://www.devsecurely.com/blog/2024/06/cors-the-ultimate-guide#comments</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Mon, 03 Jun 2024 16:41:16 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[checklist]]></category>
		<category><![CDATA[CORS]]></category>
		<category><![CDATA[web application security]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=191</guid>

					<description><![CDATA[<p>Imagine visiting a website showing innocent kitten pictures. But behind all those cute feline creatures hides this website&#8217;s superpower. As soon as someone visits this website, the owner of...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/06/cors-the-ultimate-guide">CORS: the ultimate guide</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/06/cors-the-ultimate-guide/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Lock Down Your Admin Area: How to Control Access for Maximum Security</title>
		<link>https://www.devsecurely.com/blog/2024/05/lock-down-your-admin-area-how-to-control-access-for-maximum-security?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lock-down-your-admin-area-how-to-control-access-for-maximum-security</link>
					<comments>https://www.devsecurely.com/blog/2024/05/lock-down-your-admin-area-how-to-control-access-for-maximum-security#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Mon, 27 May 2024 13:53:48 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[attack surface]]></category>
		<category><![CDATA[checklist]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[network services]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=185</guid>

					<description><![CDATA[<p>The white house situation room is the pinnacle of power in the USA and in the world. There, the president gets his security briefings, and from there he can...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/05/lock-down-your-admin-area-how-to-control-access-for-maximum-security">Lock Down Your Admin Area: How to Control Access for Maximum Security</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/05/lock-down-your-admin-area-how-to-control-access-for-maximum-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The simple 3 step process to reduce your network exposure</title>
		<link>https://www.devsecurely.com/blog/2024/05/the-simple-3-step-process-to-reduce-your-network-exposure?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-simple-3-step-process-to-reduce-your-network-exposure</link>
					<comments>https://www.devsecurely.com/blog/2024/05/the-simple-3-step-process-to-reduce-your-network-exposure#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Fri, 24 May 2024 16:19:43 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[attack surface]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[network services]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=180</guid>

					<description><![CDATA[<p>In an n-tier architecture application, a client communicates with at least one service. This target service is hosted on a particular server. Let us take a web application as...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/05/the-simple-3-step-process-to-reduce-your-network-exposure">The simple 3 step process to reduce your network exposure</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/05/the-simple-3-step-process-to-reduce-your-network-exposure/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>7 tips to make your upload API hack proof</title>
		<link>https://www.devsecurely.com/blog/2024/05/7-tips-to-make-your-upload-api-hack-proof?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=7-tips-to-make-your-upload-api-hack-proof</link>
					<comments>https://www.devsecurely.com/blog/2024/05/7-tips-to-make-your-upload-api-hack-proof#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Fri, 17 May 2024 08:46:35 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[checklist]]></category>
		<category><![CDATA[upload]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=159</guid>

					<description><![CDATA[<p>If you allow users to upload files, you need to make sure your website is secure against common file upload attacks. This post helps you identify potential issues and...</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/05/7-tips-to-make-your-upload-api-hack-proof">7 tips to make your upload API hack proof</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/05/7-tips-to-make-your-upload-api-hack-proof/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How RCE Vulnerabilities Spell Disaster for Websites and Companies</title>
		<link>https://www.devsecurely.com/blog/2024/04/how-rce-vulnerabilities-spell-disaster-for-websites-and-companies?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-rce-vulnerabilities-spell-disaster-for-websites-and-companies</link>
					<comments>https://www.devsecurely.com/blog/2024/04/how-rce-vulnerabilities-spell-disaster-for-websites-and-companies#respond</comments>
		
		<dc:creator><![CDATA[Devsecurely]]></dc:creator>
		<pubDate>Tue, 30 Apr 2024 07:44:37 +0000</pubDate>
				<category><![CDATA[Web Application Security]]></category>
		<guid isPermaLink="false">https://www.devsecurely.com/blog/?p=156</guid>

					<description><![CDATA[<p>Remote Code Execution (RCE) is a category of vulnerabilities. These allow an attacker to execute system commands on the server. A lot of vulnerabilities allow direct system command execution....</p>
<p>The post <a href="https://www.devsecurely.com/blog/2024/04/how-rce-vulnerabilities-spell-disaster-for-websites-and-companies">How RCE Vulnerabilities Spell Disaster for Websites and Companies</a> appeared first on <a href="https://www.devsecurely.com/blog">Devsecurely</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.devsecurely.com/blog/2024/04/how-rce-vulnerabilities-spell-disaster-for-websites-and-companies/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
