Warning message

Log in to add comments.

Red Hat Secure Development Videos

Red Hat published on 2013-02-20T13:00:22+00:00, last updated 2013-02-20T13:00:22+00:00

Red Hat products are used by many organizations in some of the most secure computing environments in the world. We have relationships and collaborations with many U.S. Government agencies, stock exchanges, banks, and health care companies. As a result, the topic of secure coding is discussed both internally and with our partners and customers on a regular basis in an effort to create the needed resources to make secure coding an everyday practice.

To make secure coding work we understand that developers need information to improve their coding skills. Over the course of this year Red Hat's Product Security Team will begin releasing videos, guides, and other materials to help developers better understand secure coding principals.

The first video in the series has just been released and briefly discusses input validation, especially when dealing with web applications, and cross-site scripting (XSS). A second video has also been released that goes into more depth with explaining input validation including SQL injection and Command and Code Injection. More videos are on their way so stay tuned to Red Hat's Developer channel on YouTube.


About The Author

RH Red Hat

Red Hat

This user is used for automation in Pantheon as part of the Docs publishing toolchain.