Dustin Silveri

Dustin Silveri

Dustin Silveri is a Senior Security Researcher with Veracode's Applied Research Team. He focuses on APIs and associated technologies. He started in IT as a Sysadmin and traversed his career into pentesting networks, Red Teaming, and application security.

Stay up to date on Application Security

Posts by Dustin Silveri
  • Breaking Down the OWASP Top 10 API…
    | By Dustin Silveri

    The OWASP Top Ten lists have been the cornerstone for application security best practices for over two decades. The 2019 list was the first edition of the OWASP API Security Top 10. The latest, OWASP API Security Top 10 2023, gives our security and engineering teams a glimpse of attack vectors…

    Read Article
     
  • Secrets Management Best Practices:…
    | By Dustin Silveri

    Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the fifth and final part of the series, and it will teach you to handle credentials and secrets management best practices for securing cloud-…

    Read Article
     
  • Easily Enable Encryption: Secure Cloud-…
    | By Dustin Silveri

    Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the fourth part of the series, and it will teach you why and how to easily enable encryption and save yourself headaches down the road. Here'…

    Read Article
     
  • Managing Storage Access: Secure Cloud-…
    | By Dustin Silveri

    Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the third part of the series, and it will teach you how to secure cloud storage and handle access controls on S3 buckets. Each cloud provider…

    Read Article
     
  • How to Enable Logging: Secure Cloud-…
    | By Dustin Silveri

    Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the second part of the series, and it will teach you how and why to enable logging from the start.  We’re going to talk about enabling…

    Read Article
     
  • Choosing Secure Container Images:…
    | By Dustin Silveri

    Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the first part of the series, and it will teach you how to choose secure container images.  When it comes to building secure cloud-native…

    Read Article