I did a Q&A with BetaNews about "Why it's time for a new approach to agile security Q&A".
Take a look at the same at the following link:
Link for Q&A
Monday, August 1, 2016
Defensive Programming for JavaEE Web Applications - Workshop in Kerala 18-Aug-2016
If you are in or around Kerala, come join me for a day long workshop on "
Defensive Programming for JavaEE Web Applications".
You can find all details about the workshop on the conference page located here:
http://is-ra.org/c0c0n/workshops#WS1
You can find all details about the workshop on the conference page located here:
http://is-ra.org/c0c0n/workshops#WS1
Monday, July 11, 2016
Overcoming the 6 Most Common Threat Modeling Misconceptions
Threat modeling promotes the idea of thinking like an attacker. It enables organizations to build software with security considerations, rather than addressing security as an afterthought. However, there are some very common misconceptions that can cause firms to lose their grip around the threat modeling process. This eBook shines a bright light onto the essentials and helps to get your bearings straight with all things related to threat modeling.
Download the complete eBook to:
- Learn about the most common threat modeling misconceptions
- Discover the 5 pillars of a successful threat model
- Determine how to take control of your risk management process
The eBook is published on my company's website, you can download the same from here:
Wednesday, June 15, 2016
How to Build Security Into Your Software Development Process
An amazing ebook. Download and let us know your thoughts!
To standardize the software development life cycle (SDLC), organizations implement development methodologies to fulfill their objectives in a way that best suits their organizational goals. Whether you use Agile, Waterfall, or something in between, building security into your SDLC can improve efficiency and reduce costs if it’s done the right way.
Download the complete eBook to:
- Learn how to add security to the various phases of your SDLC
- Understand how secure software development works in theory and in the real world
- Examine how to implement security activities with purpose
- See how to get started
Friday, May 20, 2016
Speaking @ Jenkins World 2016
I am excited and honored to be speaking at this years Jenkins World 2016 Conference to be held in SANTA CLARA CONVENTION CENTER, CALIFORNIA from SEPTEMBER 13 - 15, 2016.
If you are passionate about Security, Jenkins than come see me talk at the conference.
I am giving a talk on "The Three Pillars Behind Continuous Security".
I have been using Jenkins from the day it was made public and was called Hudson. No matter what you are using Jenkins or Hudson or Bamboo or any other CI tool, this talk is definitely going to help you Build Security In.
If you are passionate about Security, Jenkins than come see me talk at the conference.
I am giving a talk on "The Three Pillars Behind Continuous Security".
I have been using Jenkins from the day it was made public and was called Hudson. No matter what you are using Jenkins or Hudson or Bamboo or any other CI tool, this talk is definitely going to help you Build Security In.
Saturday, May 14, 2016
SECOND ANNUAL CYBERSECURITY WORKSHOP FOR WOMEN AND MINORITIES!
I am excited to be part of the panel and contributing to the"
SECOND ANNUAL CYBERSECURITY WORKSHOP FOR WOMEN AND MINORITIES!" conference in Huntsville, Alabama.
The link to the page is attached below:
Conference Page
If you are in and around Huntsville, come join us.
SECOND ANNUAL CYBERSECURITY WORKSHOP FOR WOMEN AND MINORITIES!" conference in Huntsville, Alabama.
The link to the page is attached below:
Conference Page
If you are in and around Huntsville, come join us.
Subscribe to:
Posts (Atom)