logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: John Morello
2022-10-28

tldr - powered by Generative AI

Cloud native application security solutions need to protect and provide visibility and enforcement from code to deployment to test all the way into the cloud runtime environment, be technostic, and application aware.
  • Cloud migration journeys are accelerating and increasing for many organizations
  • Applications are increasingly becoming containerized and the tech stack for cloud native applications is continuing to evolve
  • Organizations are faced with three primary challenges around Cloud Security: more entities to secure, entities are changing more quickly, and there is no one single Cloud pattern
  • Successful organizations focus on three fundamental areas: security as a full life cycle thing, technostic stack, and application aware
  • A good Cloud native application security solution needs to protect and provide visibility and enforcement from code to deployment to test all the way into the cloud runtime environment, be technostic, and application aware
Authors: Veronica Schmitt
2021-09-24

tldr - powered by Generative AI

The speaker discusses the importance of implementing five simple philosophies for application logging to improve cybersecurity and DevOps practices.
  • The five philosophies were inspired by Gene Kim's book and include keeping logs simple, tagged, clean, focused, and customer-oriented.
  • Logs should be easy to read and maintain, with just enough detail to debug without compromising sensitive information.
  • Tagging sensitive data and creating metadata can help prevent accidental disclosure and aid in digital forensics and incident response.
  • Continuous improvement and psychological safety are crucial for teams to admit mistakes and learn from them.
  • Customer focus should be prioritized in building custom-oriented, secure applications.
Authors: Vickie Li
2021-09-24

tldr - powered by Generative AI

The presentation discusses the basics of conducting a security code review to find vulnerabilities in an application's source code.
  • Manual code reviews are valuable for finding security issues caused by insecure coding practices
  • Prioritizing analysis and using automated tools can speed up the process
  • Combining automated tools with manual code analysis can ensure fewer bugs make it to production