
Sign up to save your podcasts
Or
The practice of "shift left," which involves moving security concerns to the code level and increasing developers' responsibility for security, is facing a backlash, with both developers and security professionals expressing concerns. Peter Klimek, director of technology at Imperva, discusses the reasons behind this backlash in this episode.
Some organizations may have exhausted the benefits of shift left, while the main challenge for many isn't finding vulnerabilities but finding time to address them. Security attacks are now targeting business logic vulnerabilities rather than dependencies, which shift left tools are better at identifying. These business logic vulnerabilities are often tied to authorization decisions, making them harder to address through code-level tools. Additionally, attacks increasingly focus on the frontend, such as API development and cart attacks.
Klimek emphasizes the need for development and security teams to collaborate and advocates for using DORA metrics to assess the impact of security efforts on the development pipeline. Some organizations may reach a point where the tools added to the development lifecycle become counterproductive, he notes. DORA metrics can help determine when this occurs and provide valuable insights for security teams.
Learn more from The New Stack about Developer Security and Imperva:
Why Your APIs Aren’t Safe — and What to Do about It
What Developers Need to Know about Business Logic Attacks
Are Your Development Practices Introducing API Security Risks?
4.3
3131 ratings
The practice of "shift left," which involves moving security concerns to the code level and increasing developers' responsibility for security, is facing a backlash, with both developers and security professionals expressing concerns. Peter Klimek, director of technology at Imperva, discusses the reasons behind this backlash in this episode.
Some organizations may have exhausted the benefits of shift left, while the main challenge for many isn't finding vulnerabilities but finding time to address them. Security attacks are now targeting business logic vulnerabilities rather than dependencies, which shift left tools are better at identifying. These business logic vulnerabilities are often tied to authorization decisions, making them harder to address through code-level tools. Additionally, attacks increasingly focus on the frontend, such as API development and cart attacks.
Klimek emphasizes the need for development and security teams to collaborate and advocates for using DORA metrics to assess the impact of security efforts on the development pipeline. Some organizations may reach a point where the tools added to the development lifecycle become counterproductive, he notes. DORA metrics can help determine when this occurs and provide valuable insights for security teams.
Learn more from The New Stack about Developer Security and Imperva:
Why Your APIs Aren’t Safe — and What to Do about It
What Developers Need to Know about Business Logic Attacks
Are Your Development Practices Introducing API Security Risks?
272 Listeners
284 Listeners
152 Listeners
40 Listeners
9 Listeners
621 Listeners
3 Listeners
441 Listeners
4 Listeners
201 Listeners
987 Listeners
189 Listeners
181 Listeners
192 Listeners
62 Listeners
47 Listeners
75 Listeners
53 Listeners