Tanya Janca on Secure Coding, AI in Security, and Her New Book!

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in ...
Is your roadmap prioritizing memory safe programming languages?

Is your roadmap prioritizing memory safe programming languages?

Cybersecurity agencies from five different national governments put out a plea in December for developers to use memory-safe programming languages. Are you ready? ...
Is your roadmap prioritizing memory safe programming languages?

Is your roadmap prioritizing memory safe programming languages?

Cybersecurity agencies from five different national governments put out a plea in December for developers to use memory-safe programming languages. Are you ready? ...
GenAI Influencing the Secure Code Review Profession

GenAI Influencing the Secure Code Review Profession

 It’s tough to be a secure code reviewer. There are already over 700 programming languages according to Wikipedia, and seemingly more languages materializing every year. Expectations are high that rapid developments in ...
application cyberwarfare firewall

AI, Processor Advances Will Improve Application Security

Applications may soon become more secure as code written by artificial intelligence (AI) platforms finds its way onto next-generation secure processors. Matt Jarvis, director of developer relations for Snyk, told attendees at ...
Security Boulevard
GitHub Flaw Underscores Risks of Open Source, RepoJacking

GitHub Flaw Underscores Risks of Open Source, RepoJacking

A GitHub vulnerability was recently discovered that lets attackers seize control of a GitHub repository and infect all the applications and code that depend on it with malicious code. This vulnerability is ...
Security Boulevard
security assessment

PDF Generator’s Eternal Bond with SSRF

As part of the Application Security Assessment, we have come across the vulnerability Server Side Request Forgery (SSRF) using HTML Injection, via PDF and image generator. As the vulnerability name suggests, an ...
Microsoft bug bounty AI LockBit ransomware

Spyderbat Tool Can Discover Log4j Vulnerabilities

Spyderbat is making available an open source tool that scans for vulnerable versions of the Log4j log management software for Java applications on Linux systems. Seth Goldhammer, vice president of product management ...
Security Boulevard
vulnerability curl patch

Code Itself Is a Growing Security Threat

As the pace of digitization across the global economy accelerates, companies are creating more and more software. This is putting greater pressure on internal teams to deliver on schedule, within budget and ...
Security Boulevard
Gilad Maayan

10 Tips for Defending Against the OWASP Top 10

The post 10 Tips for Defending Against the OWASP Top 10 appeared first on CCSI ...