Preskoči na sadržaj
Korištenjem servisa na Twitteru pristajete na korištenje kolačića. Twitter i partneri rade globalno te koriste kolačiće za analize, personalizaciju i oglase.

Za najbolje sučelje na Twitteru koristite Microsoft Edge ili instalirajte aplikaciju Twitter iz trgovine Microsoft Store.

  • Naslovnica Naslovnica Naslovnica, trenutna stranica.
  • O Twitteru

Spremljena pretraživanja

  • obriši
  • U ovom razgovoru
    Ovjeren akauntZaštićeni tweetovi @
Predloženi korisnici
  • Ovjeren akauntZaštićeni tweetovi @
  • Ovjeren akauntZaštićeni tweetovi @
  • Jezik: Hrvatski
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English
    • English UK
    • Español
    • Filipino
    • Français
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Български език
    • Русский
    • Српски
    • Українська мова
    • Ελληνικά
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Imate račun? Prijava
    Imate račun?
    · Zaboravili ste lozinku?

    Novi ste na Twitteru?
    Registrirajte se
Profil korisnika/ce clintgibler
Clint Gibler
Clint Gibler
Clint Gibler
@clintgibler

Tweets

Clint Gibler

@clintgibler

Technical Director / Research Director @NCCsecurityUS. 💙 #DevSecOps and automated bug finding. BSidesLV/AppSec Cali/DevSecCon/CactusCon/Shellcon review board

San Francisco, CA
tldrsec.com
Vrijeme pridruživanja: srpanj 2012.

Tweets

  • © 2020 Twitter
  • O Twitteru
  • Centar za pomoć
  • Uvjeti
  • Pravila o privatnosti
  • Imprint
  • Kolačići
  • Informacije o oglasima
Odbaci
Prethodni
Sljedeće

Idite na profil osobe

Spremljena pretraživanja

  • obriši
  • U ovom razgovoru
    Ovjeren akauntZaštićeni tweetovi @
Predloženi korisnici
  • Ovjeren akauntZaštićeni tweetovi @
  • Ovjeren akauntZaštićeni tweetovi @

Odjava

Blokiraj

  • Objavi Tweet s lokacijom

    U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više

    Vaši popisi

    Izradi novi popis


    Manje od 100 znakova, neobavezno

    Privatnost

    Kopiraj vezu u tweet

    Ugradi ovaj Tweet

    Embed this Video

    Dodajte ovaj Tweet na svoje web-mjesto kopiranjem koda u nastavku. Saznajte više

    Dodajte ovaj videozapis na svoje web-mjesto kopiranjem koda u nastavku. Saznajte više

    Hm, došlo je do problema prilikom povezivanja s poslužiteljem.

    Integracijom Twitterova sadržaja u svoje web-mjesto ili aplikaciju prihvaćate Twitterov Ugovor za programere i Pravila za programere.

    Pregled

    Razlog prikaza oglasa

    Prijavi se na Twitter

    · Zaboravili ste lozinku?
    Nemate račun? Registrirajte se »

    Prijavite se na Twitter

    Niste na Twitteru? Registrirajte se, uključite se u stvari koje vas zanimaju, i dobivajte promjene čim se dogode.

    Registrirajte se
    Imate račun? Prijava »

    Dvosmjerni (slanje i primanje) kratki kodovi:

    Država Kod Samo za korisnike
    Sjedinjene Američke Države 40404 (bilo koje)
    Kanada 21212 (bilo koje)
    Ujedinjeno Kraljevstvo 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Irska 51210 Vodafone, O2
    Indija 53000 Bharti Airtel, Videocon, Reliance
    Indonezija 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italija 4880804 Wind
    3424486444 Vodafone
    » Pogledajte SMS kratke šifre za druge zemlje

    Potvrda

     

    Dobro došli kući!

    Vremenska crta mjesto je na kojem ćete provesti najviše vremena i bez odgode dobivati novosti o svemu što vam je važno.

    Tweetovi vam ne valjaju?

    Prijeđite pokazivačem preko slike profila pa kliknite gumb Pratim da biste prestali pratiti neki račun.

    Kažite mnogo uz malo riječi

    Kada vidite Tweet koji volite, dodirnite srce – to osobi koja ga je napisala daje do znanja da vam se sviđa.

    Proširite glas

    Najbolji je način da podijelite nečiji Tweet s osobama koje vas prate prosljeđivanje. Dodirnite ikonu da biste smjesta poslali.

    Pridruži se razgovoru

    Pomoću odgovora dodajte sve što mislite o nekom tweetu. Pronađite temu koja vam je važna i uključite se.

    Saznajte najnovije vijesti

    Bez odgode pogledajte o čemu ljudi razgovaraju.

    Pratite više onoga što vam se sviđa

    Pratite više računa da biste dobivali novosti o temama do kojih vam je stalo.

    Saznajte što se događa

    Bez odgode pogledajte najnovije razgovore o bilo kojoj temi.

    Ne propustite nijedan aktualni događaj

    Bez odgode pratite kako se razvijaju događaji koje pratite.

    Clint Gibler‏ @clintgibler 28. sij
    • Prijavi Tweet

    Over the past few years I've spent 100s (1000s?) of hours studying how companies have scaled their security. Here are my @AppSecCali slides that distill what I've learned- the big, scalable, systematic wins that measurably improve your security posture.https://docs.google.com/presentation/d/1zbj9XBiv6r6zla0KHNfs63Ux45QZAfRut2zlK7o-dRw/edit#slide=id.g6555b225cd_0_1069 …

    10:23 - 28. sij 2020.
    • 83 proslijeđena tweeta
    • 180 oznaka „sviđa mi se”
    • Clint Gibler Dale Bachman Eric Aisling Dempsey ashg Joey Tyson Allie Mellen Alex Rice Jagan Mohan
    83 proslijeđena tweeta 180 korisnika označava da im se sviđa
      1. Novi razgovor
      2. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        The slides include 💯+ links to my favorite #DevSecOps talks, blog posts, & useful tools. I've organized them by category so that you can easily delve into whichever topics are most useful to you and your company right now.

        1 reply 0 proslijeđenih tweetova 6 korisnika označava da im se sviđa
        Prikaži ovu nit
      3. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        Talk structure 🗺️Big Picture * Mindsets / Principles * Choosing how to invest your time 📈 Scaling Your Company's Security * Fundamentals, scaling efforts, long term wins ✅ Action Plan * Tie everything together and put it into practice

        1 reply 1 proslijeđeni tweet 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      4. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🧠 Mindsets / Principles 🤖 Automate as much as possible 🛤️ Build guardrails, don't be gatekeepers ⚠️ Prefer high signal tools & alerting (FNs > FPs) 🤝 Devs are your customers - security tool/library UI & UX are important! And for the kids these days 👇pic.twitter.com/26oWhsGt0w

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      5. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        ⏰Choosing How to Invest Your Time Ask yourself: Of my near / medium term tasks, which will provide the most long-term strategic value? Can I do a near term task a little bit differently to make it much more useful later?

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      6. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🛠️ Tools in Your Security Tool Belt 💡Key insight: Certain approaches are *inherently* better or worse in certain situations, regardless of the specific tool. Instead of: "How can I make tool X better?" Ask: "Is approach Y a good fit for what I'm trying to do?"pic.twitter.com/xtk17O06vS

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      7. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        I also think it's useful to target vulns in terms of their * Class - XSS, SSRF, access controls, ... * Complexity - What level of analysis complexity is needed to find/prevent it consistently with high signal? Both can influence our approach.pic.twitter.com/Fu3Gz9ZIg1

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      8. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        Eventually your breakdown may look like this: * Secure defaults - solve many issues categorically * Tools - helpful for security baselines * #BugBounty - Continuous coverage * #Pentesting - Find the hard stuff * Runtime monitoring - Best for finding certain hard casespic.twitter.com/VngdbgEkKa

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      9. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        Here's how the @netflix #appsec team has been thinking about it: This first image is from @astha_singhal and @coffeetocode @AppSecCali '18: https://www.youtube.com/watch?v=L1WaMzN4dhY&feature=youtu.be&t=1855 … The 2nd is @HelloArbit & Esha Kanekar @AppSecCali '19: https://tldrsec.com/blog/appsec-cali-2019/#a-pragmatic-approach-for-internal-security-partnerships …pic.twitter.com/GUGBjYgPXU

        1 reply 2 proslijeđena tweeta 4 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      10. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        📋 The Fundamentals * Vulnerability Management * Continuous Scanning * Asset Inventory These are not the fundamentals because they're easy. In fact, they're *really* hard to do well. But, if you have a solid base, you can build awesome, high leverage things on top of them.

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      11. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🐞 Vuln Management Table stakes for knowing a) how you're currently doing and b) if your future initiatives actually help. Minimize friction, track all vulns in 1 system, define a consistent workflow, track vuln class/risk/what found it/+ other meta info Example dashboards👇pic.twitter.com/8DztY1deiW

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      12. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🔍 Continuous Scanning Building a pipeline to continuously scan new code as its committed and deployed is one of the most consistent trends I've seen. I've found at least 10 talks from diff companies about their approach. Here are trends they all generally agree on:pic.twitter.com/94yzwMkkx3

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      13. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        * Focus on iteration speed (adding/removing tools, testing new rules) * Scans should be fast - give devs feedback while they have context * Show tool findings within dev systems (e.g PR comment) * Focus on high signal checks (+95% TP) * Capture metrics: common finding types, FPs

        1 reply 0 proslijeđenih tweetova 3 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      14. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        👀 What to Look For Static analysis * Banned / dangerous functions (e.g. exec) * Security-relevant code additions * Sensitive file changes * Out of date deps Dynamic * Ensure a security baseline * Regression unit tests * Fuzzing Don't try to find every bug, too noisy📢

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      15. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🛃 Asset Inventory Know what you own & how they connect. Start with: * Code - CODEOWNERs file * Cloud - servers, services used, creds, permissions, ... See cartography by @lyft & @sachafaust: represent assets as nodes, relationships as edges -> Neo4J https://github.com/lyft/cartography …pic.twitter.com/dBQrR3czIN

        1 reply 3 proslijeđena tweeta 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      16. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        An example of the power of asset inventory (steps 1, 3, 4 via graph traversal) 💥 New Struts RCE #StrutsBleed ->🤬 1. Find all Internet facing servers 2. Use curl PoC to determine which are vulnerable 3. Determine code running those services 4. Find code owner, ask them to fixpic.twitter.com/ZN0lqaRzh8

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      17. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        📈 Scaling Your Efforts Once you have the fundamentals, here are some ways to start scaling. * Threat Modeling * Security Enginenering * Continuous Compliance * Detection & Response

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      18. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🖼️Threat Modeling Security team can't TM every story. What do you focus on? Common approaches: 1. Self-service security questionnaires for devs 2. Add lightweight threat modeling to SDLC 3. Threat model as code Talk links, example questionnaires, etc:https://docs.google.com/presentation/d/1zbj9XBiv6r6zla0KHNfs63Ux45QZAfRut2zlK7o-dRw/edit#slide=id.g7cb6a2a1f9_1_202 …

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      19. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🛣️ Security Engr Build safe by default libs, tools, & services for devs so they can do their jobs without thinking about security. If X requires security context to not foot gun -> build a wrapper lib. Good dev UX is critical. Build security into project starter templates

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      20. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        @Hackimedes: how DocuSign killed ReDoS, XXE, open redirects, SSRF via secure-by-default libs + ensuring their use 1. Find the bad pattern 2. Make the safe pattern the default 3. Train the devs to use the platform 4. Build tools to enforce the new rules https://shellcon.io/slides/dont-run-with-scissors-shellcon2019.pptx …

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      21. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        ✔️ Continuous Compliance Specify compliance, security, & other policy requirements in code * https://www.inspec.io/  * https://www.capitalone.com/tech/solutions/cloud-custodian … You can also scan config management scripts: Terraform: https://github.com/liamg/tfsec  https://github.com/bridgecrewio/checkov …https://github.com/cesar-rodriguez/terrascan …

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      22. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        CloudFormation: https://github.com/Skyscanner/cfripper/ … https://github.com/stelligent/cfn_nag … AWS IAM policies: https://github.com/duo-labs/parliament/ … by @0xdabbad00https://duo.com/blog/an-aws-iam-policy-linter-parliament …

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      23. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🚨 Detection & Response Slack IR bot: when a user does something fishy, ask them if it was actually them + 2FA prompt. Blog post by @ryanhuber https://slack.engineering/distributed-security-alerting-c89414c992d6 … PoC bot release by Dropbox: https://github.com/dropbox/securitybot … @appsecusa '18 by @krachpot https://www.youtube.com/watch?v=jNxjUKZpDWo …pic.twitter.com/8K2enjAFii

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      24. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        Other neat examples: How Dropbox auto gathers relevant context for their analysts Twilio's SOCless: write runbooks to scalably handle events https://www.twilio.com/blog/introducing-twilio-socless … "Githubification" of Infosec by @JohnLaTwC - how blue teams can push the industry forward togetherpic.twitter.com/fZmx7KiOdQ

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      25. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🗓️ Security Endgame Long term, high leverage investments * Automating Least Privilege * Targeting Vuln Classes: Case Study * Enforce Invariants * Quantifying Risk

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      26. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🛑 Automating Least Privilege RepoKid (https://github.com/Netflix/repokid ) by @travismcpeak automatically removes unused permissions from IAM roles. Policy Sentry (https://github.com/salesforce/policy_sentry …) by Kinnaird McQuade makes it easier to generate least privilege IAM policiespic.twitter.com/9tmaW29uP7

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      27. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🎯 Targeting Vuln Classes Aggregate historical vulns, group by vuln class / discovery method, weight by impact What can find/prevent them at scale (while minimizing cost & AppSec time)? * Is 1 method finding most high severity vulns? * Past successes you can learn from?pic.twitter.com/wNJveK4S6v

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      28. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        The goal here is to become *strategically more effective and higher leveraged over time*. Imagine you did a time audit of how your #appsec team spends its time. Hm, that's a lot of time on XSS, let's drill in. Eliminate XSS -> reinvest that time in solving other problemspic.twitter.com/xH0BSDHomD

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      29. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        Short term, these efforts won't yield much. But this will compound as you become higher leveraged over time 📈 * Invest effort based on vuln history * Consider: vuln classes, what’s finding them, impact * What’s the most effective way (AppSec time / $) to reduce risk?pic.twitter.com/nBngWbQhrL

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      30. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        🔫 Invariants Enforce or alert on things that should *always* or *never* be true. e.g. Manual changes should never be made through the AWS Console - https://arkadiyt.com/2019/11/12/detecting-manual-aws-console-actions/ … by @arkadiyt CloudTrail should always be on 👉 Auto re-enable w/ a Lambda if it's ever disabled

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      31. Clint Gibler‏ @clintgibler 28. sij
        • Prijavi Tweet

        We should never use these <regions> or <cloud services> * If this occurs, likely malicious activity * Can also be done per-app / service From @travismcpeak & @__muscles great talk @AppSecCali '19 talk:https://tldrsec.com/blog/appsec-cali-2019/#netflixs-layered-approach-to-reducing-risk-of-credential-compromise …

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      32. Još 9 drugih odgovora

    Čini se da učitavanje traje već neko vrijeme.

    Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

      Sponzorirani tweet

      false

      • © 2020 Twitter
      • O Twitteru
      • Centar za pomoć
      • Uvjeti
      • Pravila o privatnosti
      • Imprint
      • Kolačići
      • Informacije o oglasima