ShiftLeft Engineering — Integrating your Go services with JIRA

ShiftLeft Engineering — Integrating your Go services with JIRA

ShiftLeft Engineering — Integrating your Go services with JIRAHow did ShiftLeft Engineering integrate its Go Services with JIRA to create a stable bidirectional JIRA based workflowAt ShiftLeft, we decided on an aim to empower developers to ...
ShiftLeft Tales — Reducing PoV onboarding times from few weeks to less than 5 minutes!

ShiftLeft Tales — Reducing PoV onboarding times from few weeks to less than 5 minutes!

ShiftLeft Tales — Reducing PoV onboarding times from few weeks to less than 5 minutes!ShiftLeft Product/Engineering team latest product re-design reduced our product demo & onboarding timelines from weeks to less than 5 minutes. We ...
New feature — Ability to compare any two code analysis scans

New feature — Ability to compare any two code analysis scans

New feature — Ability to compare results of any two code analysis scansShiftLeft Next Generation Static Code Analysis now allows you to compare any two versions of your code scans. By using the compare scans ...
HTTP Request Smuggling: A Primer

HTTP Request Smuggling: A Primer

One of the security issues you might face with your website or web app is request smuggling.HTTP request smuggling is a security vulnerability that allows an attacker to interfere with the way ...
Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer

Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer

Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weaferhttps://medium.com/media/d9752cdc858ba8e31c8a1e8e4b8dba93/hrefVincent Weafer, SVP Security Engineering at Capital One in a conversation with Alok Shukla, VP Product Management at ShiftLeft and host of ...
Mitigating NoSQL Injection Attacks: Part 2

Mitigating NoSQL Injection Attacks: Part 2

This is the second part of a two-part series on NoSQL injections. Last time, we covered the anatomy of a NoSQL injection, as well as how to mitigate it. In this post, ...
Hunting 0-days in Cisco DCNM with ShiftLeft Ocular

Hunting 0-days in Cisco DCNM with ShiftLeft Ocular

Hunting 0-days in Cisco Data Center Network Manager (DCNM) with ShiftLeft OcularSince the CVEs are now public, it’s time to show how ShiftLeft Ocular was used to discover three zero-day vulnerabilities in ...
Mitigating NoSQL Injection Attacks: Part 1

Mitigating NoSQL Injection Attacks: Part 1

In this first part of a two-part post series, we’ll reconstruct a NoSQL injection and cover the basics of mitigating it. In the second part, we’ll look at Server-Side JavaScript and Blind ...
What AppSec Can Learn From Developers’ Feature Bug Workflows

What AppSec Can Learn From Developers’ Feature Bug Workflows

In order to scale application security (AppSec) to meet the pace of the software feature development, AppSec must engage developers with new workflows that balance security and productivity. In order to meet ...
Podcast-Ep-7 #Shifting Left at Roblox — A conversation with Julie Tsai

Podcast-Ep-7 #Shifting Left at Roblox — A conversation with Julie Tsai

Podcast-Ep-7 #Shifting Left at Roblox — A conversation with Julie Tsaihttps://medium.com/media/8fc7d0da852ac4bbc3b362907bea2532/hrefThis article was initially published hereA conversation with Julie Tsai on her initiative of #ShiftLeft at Roblox. Julie is the Head of Information Security ...