shiftleft - Tagged - Security Boulevard
Announcing ShiftLeft CORE — A Code Security Platform

Announcing ShiftLeft CORE — A Code Security Platform

Announcing ShiftLeft CORE — A Code Security PlatformWe are excited to announce the launch of our new platform — ShiftLeft CORE! The word platform is often overused and misused. Many companies rename their existing products and acquisitions, ...

ZeroNorth and ShiftLeft Integrate to Empower Developers to Improve Application Security at the Speed of DevOps

| | shiftleft, ZeroNorth
New integration helps make application security transparent and friction free for developers so they can deliver secure applications without disrupting DevOps workflows Boston, December 8, 2020 – ZeroNorth, the only company to ...
Security Boulevard
ShiftLeft Engineering — Integrating your Go services with JIRA

ShiftLeft Engineering — Integrating your Go services with JIRA

ShiftLeft Engineering — Integrating your Go services with JIRAHow did ShiftLeft Engineering integrate its Go Services with JIRA to create a stable bidirectional JIRA based workflowAt ShiftLeft, we decided on an aim to empower developers to ...
ShiftLeft Tales — Reducing PoV onboarding times from few weeks to less than 5 minutes!

ShiftLeft Tales — Reducing PoV onboarding times from few weeks to less than 5 minutes!

ShiftLeft Tales — Reducing PoV onboarding times from few weeks to less than 5 minutes!ShiftLeft Product/Engineering team latest product re-design reduced our product demo & onboarding timelines from weeks to less than 5 minutes. We ...
New feature — Ability to compare any two code analysis scans

New feature — Ability to compare any two code analysis scans

New feature — Ability to compare results of any two code analysis scansShiftLeft Next Generation Static Code Analysis now allows you to compare any two versions of your code scans. By using the compare scans ...
HTTP Request Smuggling: A Primer

HTTP Request Smuggling: A Primer

One of the security issues you might face with your website or web app is request smuggling.HTTP request smuggling is a security vulnerability that allows an attacker to interfere with the way ...
Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer

Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer

Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weaferhttps://medium.com/media/d9752cdc858ba8e31c8a1e8e4b8dba93/hrefVincent Weafer, SVP Security Engineering at Capital One in a conversation with Alok Shukla, VP Product Management at ShiftLeft and host of ...
Mitigating NoSQL Injection Attacks: Part 2

Mitigating NoSQL Injection Attacks: Part 2

This is the second part of a two-part series on NoSQL injections. Last time, we covered the anatomy of a NoSQL injection, as well as how to mitigate it. In this post, ...
Hunting 0-days in Cisco DCNM with ShiftLeft Ocular

Hunting 0-days in Cisco DCNM with ShiftLeft Ocular

Hunting 0-days in Cisco Data Center Network Manager (DCNM) with ShiftLeft OcularSince the CVEs are now public, it’s time to show how ShiftLeft Ocular was used to discover three zero-day vulnerabilities in ...
Mitigating NoSQL Injection Attacks: Part 1

Mitigating NoSQL Injection Attacks: Part 1

In this first part of a two-part post series, we’ll reconstruct a NoSQL injection and cover the basics of mitigating it. In the second part, we’ll look at Server-Side JavaScript and Blind ...