Resource Center  >  Blog  

Nickolay Bakharev
Since 2019, I’ve written diverse documentation, blending translation and journalism skills. Despite my surveying background, I’ve adapted to IT and cybersecurity. I’m into electronics and travel, inspired by “Zen and the Art of Motorcycle Maintenance.” Technically, I’m familiar with static site generators, implementing Antora, and creating interface texts. Familiar with tools like Atlassian, Miro, Git-based tools, pandoc, VS Code, and Linux. Despite English not being my native language, I’m committed to improvement.

Unauthorized Access: Risks, Examples, and 6 Defensive Measures

Unauthorized access is the process of gaining entry or access to a system, physical or electronic, without the permission of the owner or administrator.

Black Box Testing: Types, Techniques, Pros and Cons

What Is Black Box Testing in Software Engineering?  Black box testing involves evaluating the functionality of software without peering into its internal structures or workings. The term “black box” refers to a system where the internal mechanics are unknown, and testing solely focused on the output generated by a given input. When conducting black box

unit testing

Unit Testing: Definition, Examples, and Critical Best Practices

A unit test is a type of software test that focuses on components of a software product. The purpose is to ensure that each unit of software code works as expected. A unit can be a function, method, module, object, or other entity in an application’s source code. 

What Is Fuzzing (Fuzz Testing)? Everything You Need to Know

Fuzzing is the art of automatic bug detection. The goal of fuzzing is to stress the application and cause unexpected behavior, resource leaks, or crashes. 

5 Types of Application Security Testing You Must Know About

Application security testing (AST) is an umbrella term for methodologies that assist in finding and eliminating software vulnerabilities. The security testing process includes tests, analysis, and reports that provide insight into the security level of a software program. 

Why are SAST solutions not always the best option for AST?best ways to test Microservices security

There are many methodologies you can use to detect application vulnerabilities. One of the most common methodologies is Static Application (or Analysis) Security Testing. Before we dive into the shortcomings of SAST solutions, let’s first outline what Static Application Security Testing is.

Implementing application security throughout the SDLC

Recent studies show that developers do not actively pay attention to the security of their code unless directed otherwise. Still, application security is fundamental from the early stages of app development.

Integrating Bright scanning into Azure DevOps

DevOps focuses on speedy completion of the development processes for faster delivery of products and services at a higher quality. Not considering security in the development process can leave your application vulnerable to attacks.

Get Started
Read Bright Security reviews on G2