Rezultati pretraživanja
  1. 11. lis 2017.

    Enjoyed the conference and the energy from this community. Thank you for having us.

  2. prije 4 sata

    euh when and why did maturity models go from 5 to 3! And why in diety's name is it specific to software dev security... talking to you &

  3. The provides a framework for unified conversations with all subject matter experts.

  4. 4. velj

    This is better than the club to me

  5. 1. velj
  6. 22. lis 2019.

    Hotel bathroom for looks like someone’s really busy Github repo...

  7. 20. ruj 2019.

    Excited to release 10th study. Notice new activities observed in firms trying to software-define security governance, effective engineering-led initiatives, as well as changes to the way we observed firms conducting tried-and-true activities.

  8. Odgovor korisnicima i sljedećem broju korisnika:

    First iteration of the hybrid/pbx model, will refine this piece of work in the coming days

  9. 28. svi 2019.

    Here is doing a mapping between and to create our version of these maturity models, that we will implement has a graph (in )

  10. 19. lis 2018.

    So many great AppSec minds in one room this week at . I learned a ton and came back with pages of notes to unpack. Great conference!

  11. 19. lis 2018.

    Only at do we exchange My First Hack™ stories 'til 5AM —

  12. 19. lis 2018.

    It's actually been a dream of mine for about 8-9 years to present with sammy at . If you've not experienced his intellect, find a way to do so.

  13. 19. lis 2018.

    - Security and privacy work in service design needs to be able to feed a DevOps pipeline with compatible artifacts (i.e., stories/tasks) - Later in dev, you can piggyback privacy analysis in security threat modeling 2/2

    Prikaži ovu nit
  14. 19. lis 2018.

    Ok, what did I talk about? - Privacy risks, as a mindset and values, could be analysed already at service design / UX phase - Unlike in security, privacy risks do not always have an “attacker” - risks can realise through betrayal of assumptions 1/2

    Prikaži ovu nit
  15. 18. lis 2018.
  16. 18. lis 2018.

    Interesting takeaway from , company acquisitions fall thru based upon poor or non-existent security programs. important to investors.

  17. 18. lis 2018.

    The DevSecOps security person is someone who understands dev, the deployment pipeline, and can write a sensor (that can be as simple as a linter rule, even) to run in the pipeline/prod

  18. 18. lis 2018.

    Dr Chenxi Wang is up next as our Conference keynote: application security in the age of application intelligence

  19. 18. lis 2018.

    Gary McGraw kicks off the 9th Conference

  20. 17. lis 2018.

    Look like they meet from apart the world Congrats!!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.