Software Integrity Blog

Archive for the 'Developer Enablement' Category

 

[Webinars] Tech due diligence and AppSec tools for developers

Learn how to manage your software asset risk in tech due diligence, and discover AppSec tools and techniques to enable your developers to build security in.

Continue Reading...

Posted in Developer Enablement, Mergers & Acquisitions, Webinars | Comments Off on [Webinars] Tech due diligence and AppSec tools for developers

 

Why dependencies matter for SAST

How do static analyzers manage code dependencies? There are many ways, but the best static analyzers take a hybrid approach to dependency analysis.

Continue Reading...

Posted in Developer Enablement, Static Analysis (SAST) | Comments Off on Why dependencies matter for SAST

 

Hacking Security Episode 4: DevSecOps with Meera Rao

Hacking Security is a monthly podcast on emerging trends in application security. In Episode 4, secure development expert Meera Rao discusses DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Developer Enablement | Comments Off on Hacking Security Episode 4: DevSecOps with Meera Rao

 

How to get cloud security training for your team

To give your team the latest cloud security training, you need a fixed core curriculum and the flexibility to customize cloud training to each person’s needs.

Continue Reading...

Posted in Cloud Security, Developer Enablement, Security Training, Webinars | Comments Off on How to get cloud security training for your team

 

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article, you saw how to set up a test bed for bitcoind. We created two containers, alice and bob, and were able to set up communication between the two bitcoind instances. In this article, you’ll learn how to create a data model for the Bitcoin network protocol, then use this model in the Defensics SDK to perform fuzzing on bitcoind.

Continue Reading...

Posted in Developer Enablement, Fuzz Testing | Comments Off on Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

 

Tineola: Taking a bite out of enterprise blockchain

Parsia Hakimian and Stark Riedesel presented Tineola at DEF CON 26

Continue Reading...

Posted in Developer Enablement, General | Comments Off on Tineola: Taking a bite out of enterprise blockchain

 

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first of two articles that describe how to use the Defensics SDK to fuzz Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages and use the Defensics SDK to perform fuzzing on the bitcoind process.

Continue Reading...

Posted in Developer Enablement, Fuzz Testing | Comments Off on Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

 

Cracking XenForo corpuses: An unsupported sha256(sha256($pass).$salt) hash type

A list that recently hit Hashes.org, with 1 million records and a low crack rate, looked like an interesting target, given that the community had recovered less than 0.5% of the hashes. On taking a closer look, we quickly found out why:

Continue Reading...

Posted in Developer Enablement | Comments Off on Cracking XenForo corpuses: An unsupported sha256(sha256($pass).$salt) hash type

 

Power(Shell) to the people

Type less, write cleaner scripts, run consistently across platforms, and other reasons why Linux and OS X users can fall in love with PowerShell.

Continue Reading...

Posted in Developer Enablement | Comments Off on Power(Shell) to the people

 

Software Testing Tools Checklist: Do your tools empower your developers?

Software testing tools for developers must be accurate and easy to integrate. The Software Testing Tools Checklist asks 7 questions to help you evaluate.

Continue Reading...

Posted in Developer Enablement | Comments Off on Software Testing Tools Checklist: Do your tools empower your developers?