It’s all about the data

Data protection, controls and compliance don’t have to be an onerous obligation. With the right approach, you can turn it into a key differentiator for your business, says Tala’s Director of Product Management, Deepika Gajaria.
The pos… Continue reading It’s all about the data

Week One Featuring Research From Forrester: It’s Never Too Early in Development for Application Security

Forrester recently analyzed the current application security landscape, along with the program plans of global organizations…
The post Week One Featuring Research From Forrester: It’s Never Too Early in Development for Application Security … Continue reading Week One Featuring Research From Forrester: It’s Never Too Early in Development for Application Security

How to Publish Docker Images on a Private Nexus Repository Using Jib Maven Plugin

How to create a Nexus repository manager using HTTP and how to set up a Docker repository to publish Docker images using the jib plugin.
In this exercise, we are going to learn how to publish Docker images to a private Nexus repository with the he… Continue reading How to Publish Docker Images on a Private Nexus Repository Using Jib Maven Plugin

(Re)Introduce application security to your team

This blog was originally published at blog.shiftleft.io
Imagine you are a Development Manager or a DevSecOps leader in your organization thinking about AppSec.
Having an open conversation about application security with your team is like having th… Continue reading (Re)Introduce application security to your team

Smart Teams Use Atlassian and Sontaype to Plan Development Work

Jira software from Atlassian is one of the most widely used software in the world, helping agile development teams plan projects and manage stories, epics, tasks, tickets, workflows and backlogs.
Smart developers use Sonatype’s Nexus Platform to a… Continue reading Smart Teams Use Atlassian and Sontaype to Plan Development Work

What Does Successful Vulnerability Discovery Look Like?

If you’re developing software, you need quality assurance (QA) and you need a way to manage vulnerability discovery.…
The post What Does Successful Vulnerability Discovery Look Like? appeared first on ZeroNorth.
The post What Does Successfu… Continue reading What Does Successful Vulnerability Discovery Look Like?

What are the types of vulnerabilities that could result in exploits that do not require user interaction? [closed]

What are the existing types of vulnerabilities that could result in exploits that do not require user interaction (e.g. zero-click)? I’m trying to understand the type of zero-click attack type for us to plan proper mitigation in code.

Continue reading What are the types of vulnerabilities that could result in exploits that do not require user interaction? [closed]