Are you coming to RSA Conference? If so, join us at SCW Coffee Shop! Bluestone Lane SOMA Coffee Shop 55 2nd St, San Francisco, CA 94103 On May 6th | 12:30PM PST. Join Secure Code Warrior CTO & Co-Founder, Dr. Matias Madou, Jeffrey Martin from Mendio, John B. Dickson from Lasithi Security, and Viswanath S C. from Thales Digital Identity and Security to learn about: Incredible techniques for winning over developers and helping them prioritize security The challenges in measuring security skill development, and how to overcome them Why a developer-centric ‘Trust Score’ could be the missing piece of the compliance puzzle for every top organization and can unlock the benchmarks needed to reach new levels of risk reduction in code. https://lnkd.in/gMzG2WuJ
Viswanath S C.’s Post
More Relevant Posts
-
The vulnerability disclosure process is often unpredictable. While it can be confrontational, it's crucial for security. A recent positive experience with PaperCut Software highlights the importance of trust, communication, and collaboration in securing software.
Vulnerability disclosure can sometimes feel hostile. When it's handled well, it can unlock real collaboration, which is what happened with Horizon3.ai Chief Architect Naveen Sunkavally and PaperCut Software. He walks through that best-case scenario and how to infuse the process with more trust in Security Today: https://lnkd.in/g69wRSyd
Bringing Trust Back into the Vulnerability Disclosure Process -- Security Today
securitytoday.com
To view or add a comment, sign in
-
💡 The vulnerability disclosure process needs reform to encourage trust and cooperation. Researchers and organizations should work together in a collaborative spirit, focusing on the common goal of enhancing software security.
Vulnerability disclosure can sometimes feel hostile. When it's handled well, it can unlock real collaboration, which is what happened with Horizon3.ai Chief Architect Naveen Sunkavally and PaperCut Software. He walks through that best-case scenario and how to infuse the process with more trust in Security Today: https://lnkd.in/g69wRSyd
Bringing Trust Back into the Vulnerability Disclosure Process -- Security Today
securitytoday.com
To view or add a comment, sign in
-
Customer Marketing | Customer Advocacy | Content Writer | Open Source Intelligence | All-Source Multi-Intelligence | Publicly Available Information | Counter Threat Finance | Offensive Cyber
The vulnerability disclosure process is often unpredictable. While it can be confrontational, it's crucial for security. A recent positive experience with PaperCut Software highlights the importance of trust, communication, and collaboration in securing software.
Vulnerability disclosure can sometimes feel hostile. When it's handled well, it can unlock real collaboration, which is what happened with Horizon3.ai Chief Architect Naveen Sunkavally and PaperCut Software. He walks through that best-case scenario and how to infuse the process with more trust in Security Today: https://lnkd.in/g69wRSyd
Bringing Trust Back into the Vulnerability Disclosure Process -- Security Today
securitytoday.com
To view or add a comment, sign in
-
The vulnerability disclosure process is often unpredictable. While it can be confrontational, it's crucial for security. A recent positive experience with PaperCut Software highlights the importance of trust, communication, and collaboration in securing software.
Vulnerability disclosure can sometimes feel hostile. When it's handled well, it can unlock real collaboration, which is what happened with Horizon3.ai Chief Architect Naveen Sunkavally and PaperCut Software. He walks through that best-case scenario and how to infuse the process with more trust in Security Today: https://lnkd.in/g69wRSyd
Bringing Trust Back into the Vulnerability Disclosure Process -- Security Today
securitytoday.com
To view or add a comment, sign in
-
Detection Engineering Weekly Issue 69 is LIVE! https://lnkd.in/efBZrDYh In this post: * 💎 by Alex Teixeira on prioritizing the detection engineering backlog * Daniel Stinson-Diess on enriching your security logs with TI throughout your ETL, Adan Álvarez Vilchez debuts HoneyTrail, Alexander Matev on detecting log tampering in Linux audit logs, Kijo Girardi on simulating cloud-based exfiltration attacks after an identity compromise, Rasta Mouse pulls apart Kerberos Delegation network traffic with a test app, and Noah Corradin on detection opportunities for residential proxies * Podcasts by Risky Biz featuring 💻 Silas Cutler and The DFIR Report * Threat Landscape: Imposter certificate breakdown b y Squiblydoo, LLMJacking by Alessandro Brucato, Chainalysis deepdive on ransomware disruption and it's effects on payments to actors, Brian Krebs pivots on LockBit indictment data, and the folks at Hunt Intelligence, Inc. find Viper C2 in the wild
Det. Eng. Weekly #69 - RSA ninjas stole my badge and swag
detectionengineering.net
To view or add a comment, sign in
-
🔐 "Organizations that embrace secure coding and make security-skilled developers the heart of their security programs will find themselves well-positioned for the day when guidelines become mandatory and the legal responsibility for shipping insecure code may result in fines or other consequences." Our CEO Pieter Danhieux explains why CISA's three-year strategic plan presents a great opportunity for companies to improve software coding practices and differentiate themselves from competitors who still ship insecure code. Read Pieter's full perspective in SC Media: #securecoding #DevSecOps
Software makers can enhance their brand by embracing CISA’s new secure code guidelines
scmagazine.com
To view or add a comment, sign in
-
All systems are go for Euler v2 launch. Our final security test, the CTF with Hats Finance has ended with no one cracking the contracts. This is one of many steps we've taken to secure v2—detailed in the blog below. The comeback is now closer than ever. https://lnkd.in/gCBMe6Y7
Securing Euler
euler.finance
To view or add a comment, sign in
-
🔍 Unlock the potential of your business with code reviews!👩💻 🚀Discover how external code reviews can benefit your business, from boosting code quality, enhancing security, and transferring knowledge.👨💻 Read more in our latest blog post here ➡ https://lnkd.in/e3nwBf9A #codereviews #softwaredevelopment #techtips
To view or add a comment, sign in
-
What is the inverted pyramid analogy? In an article for SC Media, BlueFlag Security CEO Raj Mallempati outlines a useful conceptual framework that captures the essence of old approaches and reorients modern approaches to better protect against insidious threats to the software development lifecycle (SDLC) and software supply chain. Read how Raj is championing a future where software development is always inherently Secure by Design: https://lnkd.in/e4a5AM4Z #SDLCgovernance #DeveloperIdentity #SecureByDesign #BlueFlagSecurity
Rethinking SDLC security and governance: A new paradigm with identity at the forefront
scmagazine.com
To view or add a comment, sign in
-
Learn how to raise awareness of potential security flaws! Join Lisi Hocke and gain unique insights from her security testing journey. Discover the importance of experimenting with different approaches to advocate for security within a delivery team and find out what really works. Session sneak peek: https://lnkd.in/dxbPnhxC Book your ticket now. More about the talk here:https://lnkd.in/dXA5a5Xc #softwaretesting #berlintech #berlinevent #softwaredevelopment #github #softwaredevelopers #securitytesting
To view or add a comment, sign in