Get practical advice for building a culture of secure programming and implementing security as an enabler without disrupting velocity in your organization.
Learn how to manage your software asset risk in tech due diligence, and discover AppSec tools and techniques to enable your developers to build security in.
How do static analyzers manage code dependencies? There are many ways, but the best static analyzers take a hybrid approach to dependency analysis.
To give your team the latest cloud security training, you need a fixed core curriculum and the flexibility to customize cloud training to each person’s needs.
This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article, you saw how to set up a test bed for bitcoind. We created two containers, alice and bob, and were able to set up communication between the two bitcoind instances. In this article, you’ll learn how to create a data model for the Bitcoin network protocol, then use this model in the Defensics SDK to perform fuzzing on bitcoind.
A list that recently hit Hashes.org, with 1M records and low crack rate, looked like an interesting target. Taking a closer look, we quickly found out why.
Posted in Developer Enablement | Comments Off on Cracking XenForo corpuses: An unsupported sha256(sha256($pass).$salt) hash type
Type less, write cleaner scripts, run consistently across platforms, and other reasons why Linux and OS X users can fall in love with PowerShell.
Posted in Developer Enablement | Comments Off on Power(Shell) to the people
Are these common secure development challenges keeping your teams from creating secure software? Learn how to overcome them by empowering your developers.
Posted in Developer Enablement | Comments Off on Help your development teams overcome challenges
Can you really reduce the cost per defect by implementing application security best practices? Let’s explore the “so what?” that proves their real worth.
Posted in Developer Enablement | Comments Off on How to reduce risk while saving on the cost of resolving security defects
In my previous post, I wrote about a simple process for triaging vulnerabilities across applications. Once you have the issues prioritized, the vulnerability remediation process is pretty straightforward. You don’t have a lot of options; either remediate the issue, ignore it, or apply other measures (compensating controls) to mitigate the risk posed by the vulnerability.