CryptoNewsBot · @cryptonewsbot
689 followers · 37474 posts · Server schleuss.online
Chema Alonso :verified: · @chemaalonso
1004 followers · 312 posts · Server ioc.exchange
Vic · @victorp
33 followers · 70 posts · Server techhub.social

is a security-focused approach to software development that reconciles the trade-off between speed and security.

DevOps prioritizes speed and agility, whereas security emphasizes control and risk management. DevSecOps tries to resolve this conflict by embedding security into the DevOps processes without impeding the development of applications or code. What helps?

🔐 Automation: DevSecOps automates security testing and monitoring, minimizing vulnerabilities in the development process.

🔐 Shift-Left Security: DevSecOps prioritizes early security consideration, eradicating vulnerabilities from the start.

🔐 Collaboration: DevSecOps fosters collaboration among stakeholders to address security issues promptly.

🔐 Continuous Feedback ...

🔐 Scalability...

securityintelligence.com/posts

#DevSecOps #softwaredevelopment #riskmanagement #speed #agility #codevulnerabilities #securedevelopment #tradeoff #riskmitigation #securesdlc #applicationsecurity #securecoding #cloudsecurity

Last updated 1 year ago

Patricia Aas · @Patricia
4021 followers · 1710 posts · Server social.vivaldi.net

"(In)Secure C++" live public online training Aug 8th - 11th (CET)

In this 4-day training I teach how C and C++ applications can be exploited, and how you can find vulnerabilities that can be exploited. Frequently referred to as the "best training I have ever attended" by students.

Sign up, seats are limited. 20% discount on bookings of 2 or more seats, example: 2000€ for one seat, 3200€ for two.


turtlesec.no/blog/insecure-cpp

#cpp #securecoding #hacking

Last updated 1 year ago

aegilops :github::microsoft: · @aegilops
143 followers · 521 posts · Server fosstodon.org

I’ve just released attempt 2 at a workaround for monorepos with :github: Advanced Security Code Scanning results, to let you filter by project 🚀

My last try didn’t work out, but I’ve taken a new tack ⛵️ and come back with a new ✨ way…

github.com/advanced-security/m

The sample Actions workflow I’ve shown works for CodeQL, but you can apply the same idea to any Code Scanning integration.

#github #sast #GitHubAdvancedSecurity #monorepo #devsecops #securecoding

Last updated 1 year ago

Jay Cuthrell · @jay
86 followers · 286 posts · Server cuthrell.com
aegilops :github::microsoft: · @aegilops
134 followers · 483 posts · Server fosstodon.org

:github: is looking for projects to try out the upcoming Swift support in code scanning.

Sign up here:

github.com/github/codeql/discu

You’ll be able to get access to the new CodeQL-powered static source code analysis before it ships to everyone else.

#swift #opensource #github #swiftlang #iosdev #sast #securecoding #devsecops #CodeQL #betatesting #privatebeta #mobiledev

Last updated 1 year ago

aegilops :github::microsoft: · @aegilops
134 followers · 483 posts · Server fosstodon.org

:github: is looking for projects to try out the upcoming Swift support in code scanning.

Sign up here:

github.com/github/codeql/discu

You’ll be able to get access to the new CodeQL-powered static source code analysis before it ships to everyone else.

#swift #opensource #github #swiftlang #iosdev #sast #securecoding #devsecops #CodeQL #betatesting #privatebeta #mobiledev

Last updated 1 year ago

aegilops :github::microsoft: · @aegilops
134 followers · 482 posts · Server fosstodon.org
aegilops :github::microsoft: · @aegilops
122 followers · 453 posts · Server fosstodon.org

I kicked off my blog with a post about writing regex for GitHub Secret Scanning's custom patterns (which you get if you pay for Advanced Security):

aegilops.github.io/posts/regex

#github #secretscanning #securecoding #devsecops #regex #hyperscan

Last updated 1 year ago

aegilops :github::microsoft: · @aegilops
109 followers · 373 posts · Server fosstodon.org

@kytta @pamelafox this is the right way, especially the quote() call.

You should also validate the hostname e.g. validators.readthedocs.io/en/l

I would put the literal 'WEBSITE_HOSTNAME' in a global, to remove silent typos and make refactoring easier.

I don't always do this, but I thank 🙏 myself when I do.

Does the _host variable need the _ there? What's it for? The variable is used, so it's not to silence a linter.

#python #codereview #validation #securecoding

Last updated 2 years ago

reimerex · @reimerex
4 followers · 23 posts · Server infosec.exchange

Today, decided to start to do the community course regarding in @wehackpurple, as the start on my jump to create a Module that can be used in my Education Company.

#securecoding #cybersecurity

Last updated 2 years ago

OK industry I'm , false security much?

Time to fix your house so we can fix ours and get back to our knitting.

linkedin.com/posts/aprendergas

.\p

Cisco
Fortinet
Sophos
Palo Alto Networks
NETGEAR
TP-Link
ASUS
SonicWall
WatchGuard Technologies
Dell Technologies
NortonLifeLock
Check Point Software Technologies Ltd
Juniper Networks
CyberGuard Technologies Limited
Firewalla Inc
Thinkst Canary
Cisco Meraki
Ubiquiti Inc.
Zyxel
Blue Coat Systems acquired by Symantec
Symantec
Cisco Secure
Cisco Networking
Cisco - Intelligent Networking

#cybersecurity #overit #cybersec #cyberattack #infosec #vulnerability #informationsecurity #exploits #firewalls #security #vulnerabilities #firewallsecurity #firewall #edgecomputing #endpointsecurity #endpointprotection #webapplicationsecurity #securecoding #unsceb #secops #networksecurity #networking

Last updated 2 years ago

aegilops :github::microsoft: · @aegilops
71 followers · 264 posts · Server fosstodon.org

@ibboard yep, it's painful!

A mix of compiler warnings, static analysis & dynamic analysis with sanitizers helped tame it for me.

Try Clang with `-Weverything -Werror`. Fix them and sometimes suppress them.

Free static analyzers include Clang Analyzer, GCC's static analyzer, CodeQL (free for open source), cbmc, cppcheck, and DevSkim.

Clang's sanitizers (ASan, UBSan, MSan, TSan) with a fuzzer (e.g. AFL++) will find lots of bugs.

#c #sast #dast #clang #securecoding

Last updated 2 years ago

Fab :verifiedpurple: · @occirol
100 followers · 251 posts · Server infosec.exchange

@SheHacksPurple You should add more tags to your toots, you'll reach a greater audience

But for sure, @teriradichel blog is awesome and contain lots of useful resources

#infosec #appsec #securecoding

Last updated 2 years ago

Astra Kernel :verified: · @AstraKernel
685 followers · 724 posts · Server infosec.exchange

✨ Code-generating AI can introduce security vulnerabilities, study finds

👉 This is expected

👉 Does not mean it cant be resolved. Human leaves bugs including the experts.

👉 Question is whether how effieiciently retrain the model with updated datasets and avoid making future bugs(like how we train human). It is possible. It might surpass humans in that.

techcrunch.com/2022/12/28/code

#machinelearning #ai #infosec #appsec #securecoding #owasp #ml

Last updated 2 years ago

Ulf Klose 🥷 · @UlfKlose
20 followers · 250 posts · Server digitalcourage.social
heh · @heh
0 followers · 117 posts · Server ohai.social

Referenced link: thehackernews.com/2022/12/what
Originally posted by The Hacker News / @TheHackersNews@twitter.com: twitter.com/TheHackersNews/sta

What Developers Need to Fight the Battle Against Common Vulnerabilities

Read: thehackernews.com/2022/12/what

#securecoding #devsecops

Last updated 2 years ago

The Hacker News · @hackernews_bot
1523 followers · 885 posts · Server social.platypush.tech
cynicalsecurity :cm_2: · @cynicalsecurity
946 followers · 3622 posts · Server bsd.network

A. Kudriavtseva and O. Gadyatskaya, "Secure Software Development Methodologies: A Multivocal Literature Review"¹

In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce the attack surface and protect software is adoption of methodologies that apply security at each step of the software development lifecycle. While different methodologies have been proposed to address software security, recent research shows an increase in the number of vulnerabilities in software and data breaches. Therefore, the security practices incorporated in secure software development methodologies require investigation. This paper provides an overview of security practices involved in 28 secure software development methodologies from industry, government, and academia. To achieve this goal, we distributed the security practices among the software development lifecycle stages. We also investigated auxiliary (non-technical) practices, such as organizational, behavioral, legal, policy, and governance aspects that are incorporated in the secure software development methodologies. Furthermore, we explored methods used to provide evidence of the effectiveness of the methodologies. Finally, we present the gaps that require attention in the scientific community. The results of our survey may assist researchers and organizations to better understand the existing security practices integrated into the secure software development methodologies. In addition, our bridge between "technical" and "non-technical" worlds may be useful for non-technical specialists who investigate software security. Moreover, exploring the gaps that we found in current research may help improve security in software development and produce software with fewer number of vulnerabilities.


__
¹ arxiv.org/abs/2211.16987

#arxiv #researchpapers #SoftwareDevelopmentMethodologies #securecoding

Last updated 2 years ago