Julian BertoninSEEK blogListo — Failing Safely with Checklists and RFC’sUse questionnaires and checklists to make it easy to do the right thing, when you’re building softwareFeb 6, 20201Feb 6, 20201
Julian BertoninSEEK blogGet involved with SEEK’s $10K Bug Bounty ProgramThis year we are taking our Bug Bounty Program public to ensure our websites and services are secure. Anyone can now sign up & start…Jan 28, 20191Jan 28, 20191
Julian BertonPart 5 — A Guide to Running a Bug Bounty ProgramWith the Year-of-the-Breach behind us (I feel like we say that every year), it’s important for businesses with publicly available assets…Jan 5, 2019Jan 5, 2019
Julian BertonPart 4 — Delivering an Application Security Training CourseGoing by the BSIMM7 chart below (further out to the edge is more mature), companies lack maturity when it comes to training and awareness…Jul 16, 2017Jul 16, 2017
Julian BertonPart 3 — Tackling Security Culture and AwarenessSoftware development companies are starting to realise that to innovate, stay relevant and compete with competitors they need to adopt a…Jul 16, 2017Jul 16, 2017
Julian BertonPart 2 — Building an Application Security ProgrammeAn application security programme is your company’s product security game plan, that has a goal of reducing the number of security flaws…Jul 16, 20171Jul 16, 20171
Julian BertonPart 1 — Defensive Application Security in a Modern OrganisationDefending web and mobile applications against the bad guys has always been hard, there is no escaping that fact. However it doesn’t seem to…Jul 16, 2017Jul 16, 2017