Open in app

Sign In

Write

Sign In

The ShiftLeft Team
The ShiftLeft Team

88 Followers

Home

About

Published in

ShiftLeft Blog

·May 19, 2022

Reachability and Risk: Tools for Security Leaders

By Malcolm Harkins, Bryan Smith, Rob Lundy — It is impossible to manage security posture without considering two key factors in any potential vulnerability or security flaw: reachability and risk. The two factors are related. Reachability defines the degree to which a given security vulnerability that is detected, such as a CVE, can actually be attacked and exploited…

Open Source Software

7 min read

Reachability and Risk: Tools for Security Leaders
Reachability and Risk: Tools for Security Leaders
Open Source Software

7 min read


Published in

ShiftLeft Blog

·Mar 24, 2022

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud

By Arun Balakrishnan, Sr. Director Product Management Identity credentials and source code are critical assets that can create major risks for your organization when exposed by breaches of third-party cloud service companies that provide identity management and software composition analysis. …

Cybersecurity

4 min read

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud
Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud
Cybersecurity

4 min read


Published in

ShiftLeft Blog

·Mar 22, 2022

Importance of Securing Software with a Zero Trust Mindset

By Shinesa Cambric, Microsoft — This article is part of a series showcasing learnings from the Secure Software Summit. With the increase of supply chain attacks on everything from logging software like Log4J to takeovers of important JavaScript packages to compromises of network utility tools like SolarWinds, more and more organizations are recognizing the need…

Open Source

7 min read

Importance of Securing Software with a Zero Trust Mindset
Importance of Securing Software with a Zero Trust Mindset
Open Source

7 min read


Published in

ShiftLeft Blog

·Mar 17, 2022

Secure Software Summit: The State of OSS Supply Chain Security

By Dan Lorenc, Chainguard This article is part of a series showcasing learnings from the Secure Software Summit The Open Source Software (OSS) Supply Chain is under attack. As evidenced by the recent Log4Shell vulnerability, the OSS supply chain is increasingly a focus for attackers seeking to exploit weak links…

Cybersecurity

7 min read

Secure Software Summit: The State of OSS Supply Chain Security
Secure Software Summit: The State of OSS Supply Chain Security
Cybersecurity

7 min read


Published in

ShiftLeft Blog

·Mar 8, 2022

Secure Software Summit Series: Focus on Preventative Readiness

By Chetan Conikee This article is part of a series showcasing learnings from the Secure Software Summit The connected world economy and the COVID-19 pandemic forced companies to accelerate digital transformation. Sophisticated cybercriminals have seized this forced acceleration to lay the groundwork for cyberwarfare. In reaction to recent attacks ranging…

Cybersecurity

4 min read

Secure Software Summit Series: Focus on Preventative Readiness
Secure Software Summit Series: Focus on Preventative Readiness
Cybersecurity

4 min read


Published in

ShiftLeft Blog

·Mar 4, 2022

The Interview — The Job

Main Branch #25 — Main Branch is a comic strip for developers produced by James Gilbreath, Jason Green, and Vickie Li.

Software Development

1 min read

The Interview — The Job
The Interview — The Job
Software Development

1 min read


Published in

ShiftLeft Blog

·Mar 3, 2022

Secure Software Summit Findings

Shifting Security Left is a Work In Progress — What are the biggest concerns on the minds of application security and developers? As part of the inaugural Secure Software Summit event, ShiftLeft polled conference participants on a wide range of topics related to application security, supply chain security, and the current cybersecurity threat environment. The poll included responses from…

Software Development

4 min read

Secure Software Summit Findings
Secure Software Summit Findings
Software Development

4 min read


Published in

ShiftLeft Blog

·Feb 28, 2022

Good, Fast, or Cheap?

Main Branch #24 — Main Branch is a comic strip for developers produced by James Gilbreath, Jason Green, and Vickie Li.

Software Development

1 min read

Good, Fast, or Cheap?
Good, Fast, or Cheap?
Software Development

1 min read


Published in

ShiftLeft Blog

·Feb 14, 2022

Top AppSec Trends for 2022

Main Branch #23 — Main Branch is a comic strip for developers produced by James Gilbreath, Jason Green, and Vickie Li.

Software Engineering

1 min read

Top AppSec Trends for 2022
Top AppSec Trends for 2022
Software Engineering

1 min read


Published in

ShiftLeft Blog

·Feb 10, 2022

Malware Evolves to Present New Threats to Developers

Malware, or code written for malicious purposes, is evolving. — Software developers face new threats from malicious code as their tools and processes have proven to be an effective and lucrative threat vector. Traditionally, software developers have protected themselves from malicious code like everyone else — by securing their devices, keeping programs updated, and following good security practices. However, recent…

Malware

6 min read

Malware Evolves to Present New Threats to Developers
Malware Evolves to Present New Threats to Developers
Malware

6 min read

The ShiftLeft Team

The ShiftLeft Team

88 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams