<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Software Development Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/software-development/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/software-development/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Fri, 20 Sep 2024 08:50:23 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Software Development Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/software-development/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Penetration Testing in Agile Development</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-in-agile-development/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-in-agile-development</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 20 Sep 2024 08:50:21 +0000</pubDate>
				<category><![CDATA[Agile Methodologies]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Agile Development]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Security in Agile]]></category>
		<category><![CDATA[Software Testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8716</guid>

					<description><![CDATA[Introduction Agile development has become the go-to approach for software teams across the globe. Its flexibility, adaptability, and focus on rapid iterations allow teams to deliver software quickly and efficiently. However, this fast-paced cycle can sometimes overshadow security concerns. Penetration testing, or ethical hacking, is one of the most effective ways to ensure security while [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing for DevOps Environments: The Benefits</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-for-devops-environments-the-benefits/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-for-devops-environments-the-benefits</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Tue, 17 Sep 2024 15:38:39 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[DevOps Security]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Secure DevOps]]></category>
		<category><![CDATA[vulnerability testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8701</guid>

					<description><![CDATA[In the fast-paced world of DevOps, security is a critical consideration. DevOps combines development and operations to streamline software delivery. While this brings speed and efficiency, it can also create vulnerabilities. One of the most effective ways to mitigate these risks is through penetration testing for DevOps environments. What is Penetration Testing? Penetration testing, also [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Secure Coding Practices Testing in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/secure-coding-practices-testing-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=secure-coding-practices-testing-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 19 Jun 2024 08:45:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Secure Coding Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8280</guid>

					<description><![CDATA[In today&#8217;s digital age, cybersecurity is paramount. One of the best ways to ensure your applications are protected is by integrating secure coding practices into your development process. Penetration testing is a crucial step in this process, helping to identify vulnerabilities that could be exploited by malicious actors. This blog will explore the importance of [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Infrastructure as Code (IaC) in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/infrastructure-as-code-iac-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=infrastructure-as-code-iac-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 15 May 2024 02:40:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[IaC]]></category>
		<category><![CDATA[Infrastructure Testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8116</guid>

					<description><![CDATA[Infrastructure as Code (IaC) has revolutionised how we manage and provision IT infrastructure. By treating infrastructure setups as code, organisations can ensure consistency, repeatability, and version control. However, with these advantages comes the need to ensure that the IaC scripts are secure and not introducing vulnerabilities. This is where Infrastructure as Code testing in penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Source Code Analysis in Penetration Testing: Enhancing Security</title>
		<link>https://www.vertexcybersecurity.com.au/source-code-analysis-in-penetration-testing-enhancing-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=source-code-analysis-in-penetration-testing-enhancing-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 13 May 2024 01:40:50 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Secure Coding]]></category>
		<category><![CDATA[Software Vulnerabilities]]></category>
		<category><![CDATA[Source Code Analysis]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8114</guid>

					<description><![CDATA[Introduction In the realm of cyber security, penetration testing stands out as a pivotal strategy for uncovering potential vulnerabilities within software systems. Among the various techniques employed, source code analysis is increasingly recognised as an essential component. This analysis not only identifies security flaws but also enhances the overall security of the application by enabling [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Code Review in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/code-review-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=code-review-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 10 May 2024 02:35:59 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Code Review]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8108</guid>

					<description><![CDATA[Introduction to Code Review in Penetration Testing Penetration testing stands as a critical method for uncovering potential vulnerabilities in software applications. However, an often overlooked aspect of this process is the code review. Integrating code review into penetration testing workflows can significantly strengthen an organisation&#8217;s cyber security measures. What is Code Review? Code review involves [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>SSH Backdoor through XZ Utils and Open Source Security</title>
		<link>https://www.vertexcybersecurity.com.au/ssh-backdoor-through-xz-utils-and-open-source-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ssh-backdoor-through-xz-utils-and-open-source-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 00:44:27 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[oss]]></category>
		<category><![CDATA[proprietary software]]></category>
		<category><![CDATA[vs]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7817</guid>

					<description><![CDATA[In the ever-evolving landscape of cybersecurity, the recent discovery of the XZ Utils Backdoor, a critical SSH vulnerability identified as CVE-2024-3094, has once again spotlighted the importance of vigilance, thorough code review, and the inherent strengths of the open-source model. This incident involved a malicious actor who, under the guise of contributing to the project, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>DevSecOps: Transforming Penetration Testing for the Better</title>
		<link>https://www.vertexcybersecurity.com.au/devsecops-transforming-penetration-testing-for-the-better/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=devsecops-transforming-penetration-testing-for-the-better</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 03 Apr 2024 02:00:01 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Security Automation]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7803</guid>

					<description><![CDATA[Introduction In the rapidly evolving digital landscape, cyber security threats are becoming more sophisticated, necessitating a more proactive and integrated approach to security. Enter DevSecOps, a methodology that embeds security practices within the DevOps lifecycle. This fusion significantly enhances the efficiency and effectiveness of penetration testing, a critical component in identifying vulnerabilities. DevSecOps not only [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Mobile Application Penetration Testing: Ensuring Security in the Palm of Your Hand</title>
		<link>https://www.vertexcybersecurity.com.au/mobile-application-penetration-testing-ensuring-security-in-the-palm-of-your-hand/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mobile-application-penetration-testing-ensuring-security-in-the-palm-of-your-hand</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 10 May 2023 01:45:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Mobile Applications]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[mobile app security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Vulnerability Assessment]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5883</guid>

					<description><![CDATA[In today&#8217;s interconnected world, mobile applications have become an integral part of our daily lives. From banking to social media and online shopping, we rely heavily on mobile apps to access various services and perform numerous tasks. However, with the increasing dependence on mobile apps, the need to ensure their security has never been more [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
