Blog Logo
  • DevSecOps
  • Privacy
  • Tools
  • About

SECURITY IS AWESOME

SECURITY IS AWESOME

I write about security and privacy. I regularly post original security research, custom tools, and detailed technical guides.

Hacker Chibi

Dynamic Security Scanning in a CI: ZAP Scanning with Jenkins.

30 May 2019

Setup a continuous integration pipeline with automated ZAP scanning on a vulnerable application. A complete guide.

Read More

Creating a Secure Pipeline: Jenkins with SonarQube and DependencyCheck

20 May 2019

Walkthrough setting up Jenkins, SonarQube, and Dependency check with an out of the box docker configuration for rapid startup.

Read More

Integrating Security With Agile Development

18 April 2019

A roadmap for automating security tooling and integrating with agile development teams to improve security outcomes.

Read More

Launching the Mozilla Plugin Privacy Test Database

08 April 2019

About the test results of all popular Mozilla Firefox plugins. This post outlines the test methodology and code

Read More

Digging Through Someones Past Using OSINT

13 March 2019

A walkthrough of people finding using public information to find details of their life and history. Also known as doxing or OSINT.

Read More

Personal Security & Privacy Tools I Recommend

19 February 2019

Security advice for everyday usage - tech tools and systems.

Read More

How I Built an Application Inventory for a Secure Development Program

07 February 2019

Analyzing 2000 applications for the critical 50 to focus on for a secre development program. How to slice data and ask the right questions.

Read More

Building a World Class Application Security Program

29 January 2019

Let's walk through setting up a modern application security program from scratch, starting with the high level strategy and metrics.

Read More

How to Detect If a Browser Plugin is Spying On You - A Complete Guide

22 January 2019

Steps anyone can use to detect browser plugin spying, even when they try to hide it.

Read More

A Comprehensive Web Server Security Guide

04 January 2019

In this article, we will tread a middle path, and look at some ways to manage a web server securely for a variety of common deployment scenarios.

Read More
Page 3 of 4
← Newer Posts Older Posts →
  • Twitter
  • RSS Subscribe
All content copyright Null Sweep © 2025 • All rights reserved.