<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Secure Coding Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/secure-coding/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/secure-coding/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Tue, 20 Jan 2026 05:52:20 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Secure Coding Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/secure-coding/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why Frequent Production Bugs are a Major Red Flag for Your Cyber Security</title>
		<link>https://www.vertexcybersecurity.com.au/why-frequent-production-bugs-are-a-major-red-flag-for-your-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-frequent-production-bugs-are-a-major-red-flag-for-your-cyber-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 12 Jan 2026 05:05:40 +0000</pubDate>
				<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Production Issues]]></category>
		<category><![CDATA[Quality Assurance]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Secure Coding]]></category>
		<category><![CDATA[Software Development]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10190</guid>

					<description><![CDATA[Frequent production issues and developer "quick fixes" are major signs that your platform's cyber security is lacking. Learn why code quality and security are linked.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Code Comments Are Essential in the Age of AI</title>
		<link>https://www.vertexcybersecurity.com.au/why-code-comments-are-essential-in-the-age-of-ai/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-code-comments-are-essential-in-the-age-of-ai</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 05:39:59 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI coding]]></category>
		<category><![CDATA[Code comments]]></category>
		<category><![CDATA[Secure Coding]]></category>
		<category><![CDATA[software documentation]]></category>
		<category><![CDATA[software maintenance]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9917</guid>

					<description><![CDATA[Discover why code comments are a mandatory best practice for software security, team collaboration, and AI-assisted development.]]></description>
		
		
		
			</item>
		<item>
		<title>Source Code Analysis in Penetration Testing: Enhancing Security</title>
		<link>https://www.vertexcybersecurity.com.au/source-code-analysis-in-penetration-testing-enhancing-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=source-code-analysis-in-penetration-testing-enhancing-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 13 May 2024 01:40:50 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Secure Coding]]></category>
		<category><![CDATA[Software Vulnerabilities]]></category>
		<category><![CDATA[Source Code Analysis]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8114</guid>

					<description><![CDATA[Introduction In the realm of cyber security, penetration testing stands out as a pivotal strategy for uncovering potential vulnerabilities within software systems. Among the various techniques employed, source code analysis is increasingly recognised as an essential component. This analysis not only identifies security flaws but also enhances the overall security of the application by enabling [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
