
Sign up to save your podcasts
Or
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those practices address important areas of risk, but only indirectly influence a secure design. We look at tactics from coding styles to design councils as we search for guidance that makes software more secure.
Segment resources
Show Notes: https://securityweekly.com/asw-325
4.8
44 ratings
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those practices address important areas of risk, but only indirectly influence a secure design. We look at tactics from coding styles to design councils as we search for guidance that makes software more secure.
Segment resources
Show Notes: https://securityweekly.com/asw-325
1,963 Listeners
206 Listeners
361 Listeners
630 Listeners
285 Listeners
31,919 Listeners
6,285 Listeners
2,093 Listeners
1,011 Listeners
36 Listeners
7,822 Listeners
180 Listeners
312 Listeners
135 Listeners
55 Listeners