Artwork

Content provided by Security Journey. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Security Journey or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Hi/5: Minimum Viable Secure Product, Bandit, Sigstore and more

2:41
 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on January 06, 2023 10:52 (1+ y ago). Last successful fetch was on August 31, 2022 14:09 (2y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 308642238 series 2892732
Content provided by Security Journey. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Security Journey or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Minimum Viable Secure Product
Minimum Viable Secure Product is a minimalistic security checklist for B2B software and business process outsourcing suppliers.
How to Secure Python Web App Using Bandit
Bandit is a tool developed to locate and correct security problems in Python code. To do that Bandit analyzes every file, builds an AST from it, and runs suitable plugins to the AST nodes. Once Bandit has completed scanning all of the documents, it generates a report.
Explain Sigstore to me like I am five
Sigstore provides an easier way to seamlessly issue and validate signatures from constituent dependencies, including base images, all the way to the final deployed application artifact. ​
Threat Matrix for CI/CD Pipeline
This is an ATT&CK-like matrix focus on CI/CD Pipeline specific risk.
Malware Found in NPM Package with Millions of Weekly Downloads
A massively popular JavaScript library, UAParser.is (npm package), was modified with malicious code that downloaded and installed a password stealer and cryptocurrency miner on systems where compromised versions were used.

SHOW LESS

  continue reading

43 episodes

Artwork
iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on January 06, 2023 10:52 (1+ y ago). Last successful fetch was on August 31, 2022 14:09 (2y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 308642238 series 2892732
Content provided by Security Journey. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Security Journey or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Minimum Viable Secure Product
Minimum Viable Secure Product is a minimalistic security checklist for B2B software and business process outsourcing suppliers.
How to Secure Python Web App Using Bandit
Bandit is a tool developed to locate and correct security problems in Python code. To do that Bandit analyzes every file, builds an AST from it, and runs suitable plugins to the AST nodes. Once Bandit has completed scanning all of the documents, it generates a report.
Explain Sigstore to me like I am five
Sigstore provides an easier way to seamlessly issue and validate signatures from constituent dependencies, including base images, all the way to the final deployed application artifact. ​
Threat Matrix for CI/CD Pipeline
This is an ATT&CK-like matrix focus on CI/CD Pipeline specific risk.
Malware Found in NPM Package with Millions of Weekly Downloads
A massively popular JavaScript library, UAParser.is (npm package), was modified with malicious code that downloaded and installed a password stealer and cryptocurrency miner on systems where compromised versions were used.

SHOW LESS

  continue reading

43 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide