
Sign up to save your podcasts
Or
1. Finding Evil Go Packages
https://michenriksen.com/blog/finding-evil-go-packages/
Go is better protected from a software supply chain issue, but nothing is 100% safe.
2. Shifting Engineering Right: What security engineers can learn from DevSecOps
https://segment.com/blog/shifting-engineering-right/
All security people need to learn to practice developer empathy – walk a mile in your developer’s shoes.
3. Hacking is not a crime – and the media should stop using 'hacker' as a pejorative
https://www.theregister.com/2021/03/03/debate_hackers_for/
Hacking is not a crime, so stop using the term in a negative connotation, and PLEASE stop using pictures of men in basements wearing black hoodies with bright computer screens!
4. Hackers hack at unhackable new chip for three months. Chip remains unhacked
https://www.pcgamer.com/unhackable-chip-not-hacked-yet/
If a room of primates can create all the works of Shakespeare on typewriters given infinite time, then nothing is unhackable.
5. What hacking attacks can teach us about defending networks
https://www.zdnet.com/article/what-hacking-attacks-can-teach-us-about-defending-networks/
Reminder for us as Application Security people that the stakes of a specific vulnerability are high! Push MFA everywhere.
1. Finding Evil Go Packages
https://michenriksen.com/blog/finding-evil-go-packages/
Go is better protected from a software supply chain issue, but nothing is 100% safe.
2. Shifting Engineering Right: What security engineers can learn from DevSecOps
https://segment.com/blog/shifting-engineering-right/
All security people need to learn to practice developer empathy – walk a mile in your developer’s shoes.
3. Hacking is not a crime – and the media should stop using 'hacker' as a pejorative
https://www.theregister.com/2021/03/03/debate_hackers_for/
Hacking is not a crime, so stop using the term in a negative connotation, and PLEASE stop using pictures of men in basements wearing black hoodies with bright computer screens!
4. Hackers hack at unhackable new chip for three months. Chip remains unhacked
https://www.pcgamer.com/unhackable-chip-not-hacked-yet/
If a room of primates can create all the works of Shakespeare on typewriters given infinite time, then nothing is unhackable.
5. What hacking attacks can teach us about defending networks
https://www.zdnet.com/article/what-hacking-attacks-can-teach-us-about-defending-networks/
Reminder for us as Application Security people that the stakes of a specific vulnerability are high! Push MFA everywhere.