sweetcode.io sweetcode.io

Key Considerations for Building a Proper AppSec Program for Modern Application Development

Many firms’ security efforts are focused solely on deploying technologies, applying “best practices,” and responding to a never-ending stream of security alerts and threats. As a result, security becomes reactive, with teams that are too preoccupied with “firefighting” to ask whether the organization is becoming more secure. This causes friction between business executives and security personnel. When the business is running...

sweetcode.io sweetcode.io

Introduction to Fibonacci Sequence in JavaScript

In this article, we will be an introduction to the Fibonacci sequence in JavaScript from the basic level. We will start by looking at the Fibonacci sequence generally, and how it works. Lastly, we will look at how we can implement the Fibonacci sequence in Javascript. The Fibonacci sequence is a technique that displays and increases exponential growth over time. It’s also one of the four approaches to recursion research. It’s an...

sweetcode.io sweetcode.io

React and React Hooks

React is a JavaScript library. You can use it to build user interfaces for both websites and web applications. It is based on reusable UI components. React hooks are features that allow you make use of the react lifecycle without writing a class. In this article I will focus on react hooks and how you can apply them. React and React Hooks React is a flexible JavaScript library that helps build interactive user interfaces. These user...

sweetcode.io sweetcode.io

Automated Security Alert Remediation: A Closer Look

This post was previously published on The New Stack. In cloud-native organizations and software as a service (SaaS) businesses, cloud security automation is becoming a must-have feature. You can’t stay ahead of threats across several levels of your cloud environment using manual procedures alone, and you can’t rely exclusively on cloud providers’ security technology, which doesn’t operate across different clouds and lacks...

sweetcode.io sweetcode.io

5 Ways Automated Incident Response Reduces Toil

This post was previously published on The New Stack. Toil — endless, exhausting work that yields little value in DevOps and site reliability engineering (SRE) — is the scourge of security engineers everywhere. You end up with mountains of toil if you rely on manual effort to maintain cloud security. Your engineers spend a lot of time doing mundane jobs that don’t actually move the needle. Toil is detrimental to team morale...

sweetcode.io sweetcode.io

Automated Threat Hunting: A Closer Look

This post was previously published on The New Stack. Proactively finding and eliminating advanced threats through threat hunting is a growing necessity for many organizations, yet few have enough resources or skilled employees to do it effectively. For those who do have an active threat hunting program, the process is often manual and time consuming. With cloud security automation, however, you can implement rules that automatically...

sweetcode.io sweetcode.io

How to Optimize Your Blog Post

Blog posts are an excellent way to share technical information, especially for the purpose of content marketing. However, if the post is not readable and cannot be found easily (i.e., optimized for search), it defeats the purpose of writing it. Here are some tips to optimize and increase the visibility of your blog posts. The two most important factors to measure before publishing your blog post  are: readability and search engine...

sweetcode.io sweetcode.io

Seamlessly Secure Your Cloud Workloads

This post was previously published on The New Stack You’ve secured your cloud identities. You’ve hardened your cloud security posture. You’ve configured strong cloud access controls. But there’s still one more thing you need in order to secure your cloud environment: a cloud workload protection platform, or CWPP. Cloud workload protection platforms secure the workloads that run on your cloud — which are distinct from the...

sweetcode.io sweetcode.io

Align Different Perspectives to Implement AppSec

The ultimate goal of any organization that has decided to build a new application is to create a product which will be used to support a specific process. Every group inside an organization can usually agree with this statement. Unfortunately, if you want to get into any more detail and use modifying words like “stable” or “performant” or “secure,” then every area will have a different opinion on what that means. What are...

sweetcode.io sweetcode.io

Best Practices for Writing Vue.js

While Vue.js is a JavaScript framework for creating user interfaces, there are several best practices for writing Vue.js that every beginner or advanced developer should follow. Following these best practices will ensure that you create effective Vue.js code that improves readability and quality. Many miss these rules when coding, and some people are unaware of them, which is why we’ve put together a list of them in this post. The...

sweetcode.io sweetcode.io

What Is CSPM? A Closer Look at Cloud Security Posture Management

As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component in any environment leveraging cloud services. Whether you are using a single cloud or are in a multi-cloud scenario, the complexity of these cloud platforms is constantly expanding. Staying on top of new changes in policies and functionality to ensure that you are maintaining a secure environment is...