MACRO NEPAL
Home
Blog
CHATBOT
CODE COMPILER
WEALTH ORBIT
JAVA
Securing the Java Supply Chain: A Guide to Aqua Security Scanning
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
In the modern software development lifecycle, Java applications are built…
Snyk Vulnerability Scanning in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Overview Snyk is a developer security platform that helps find…
A Comprehensive Guide to OWASP Dependency-Check in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
In modern software development, applications are built using numerous third-party…
Trivy Scanner for Container Security in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Trivy is a comprehensive and versatile security scanner that detects…
Istio Fault Injection Configuration in java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
1. Istio Fault Injection Configuration Virtual Service with Fault Injection…
Implementing Notary for Container Image Trust in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Notary is a critical component in the container security ecosystem…
Service Mesh Observability in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
A comprehensive observability implementation for Java microservices in service mesh…
JWT Validation with OPA in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Introduction to JWT and OPA JSON Web Tokens (JWT) are…
Policy Enforcement with OPA in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Overview Open Policy Agent (OPA) is a general-purpose policy engine…
Snyk Vulnerability Scanning in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Overview Snyk is a developer security platform that helps find…
Previous
1
…
133
134
135
136
137
…
208
Next
💬
Macro Nepal Helper
×
→
Thinking...