Articles

Going Serverless With Jenkins X: Exploring Prow, Jenkins X Pipeline Operator, And Tekton

Apr 17, 2019 12:58:51 AM by Viktor Farcic

The serverless flavor of Jenkins X or, as some call it, Jenkins X Next Generation, is an attempt to redefine how we do continuous delivery and GitOps inside

Read More ...

2019 ICCE Panel - Securing the Software Supply Chain - Featured Image

Securing the Software Supply Chain - Live Panel for International Conference on Cyber Engagement

May 6, 2019 1:05:44 PM by Mark Miller

In April 2019, I was invited to host a panel at the International Conference on Cyber Engagement in Washington DC, to discuss "Securing the Software Supply

Read More ...

Act 4 - Outbidding

Discover Business Logic Flaws: Act 4

Apr 15, 2019 8:44:45 AM by Chetan Conikee

Online auctions offer buyers and sellers and enormous platform for trade. Registration is required to track items you bid on or sell, keep up with the bids,

Read More ...

Tanya Janca - Featured Image

DevSecOps: Securing Software in a DevOps World

Apr 11, 2019 8:59:41 AM by Tanya Janca

DevSecOps in Practice: Five Ways to Build Your DevSecOps Pipeline

Read More ...

Have something to say?

2019-04-10 Newsletter - Featured Image

What we're reading: DevSecOps Days London Slide Decks

Apr 10, 2019 6:33:47 PM by Mark Miller

What are we reading, viewing and listening to this week. Here's our top picks for the week.

Read More ...

Act 3 - The dynamic duo Andrew and Allen exploit Nordstorm with their FatWallet

Discover Business Logic Flaws: Act 3

Apr 8, 2019 9:42:07 AM by Chetan Conikee

In 2010, the criminal duo discovered a business logic flaw in Nordstorm’s e-commerce ordering system. They exploited this flaw by placing several orders that

Read More ...

Recap 2019 RSAC - Featured Image

Recap: DevSecOps Days at 2019 RSAC

Apr 1, 2019 10:52:41 AM by Mark Miller

In this video, Alan Shimel and I do a recap of DevOps Connect: DevSecOps Days at 2019 RSA Conference, talking about the sessions, what we learned and how we

Read More ...

Act 2 - Attack like it's 1000

Discovering Business Logic Flaws: Act 2

Mar 19, 2019 9:50:01 AM by Chetan Conikee

This is the 2nd article in a six-part series by Chetan Conikee. We will publish the series in it's entirety within the next few days. To be notified when a new

Read More ...

Act 1 - What is a business logic flaw - Featured Image

Discovering Business Logic Flaws - Act 1

Mar 15, 2019 12:10:51 PM by Chetan Conikee

This is the first article in a six-part series by Chetan Conikee. We will publish the series in it's entirety within the next few days.

Read More ...

Serverless Jenkins X - Viktor Farcic - Featured Image

Going Serverless With Jenkins X: Exploring Prow, Jenkins X Pipeline Operator, And Tekton

Apr 17, 2019 12:58:51 AM by Viktor Farcic

The serverless flavor of Jenkins X or, as some call it, Jenkins X Next Generation, is an attempt to redefine how we do continuous delivery and GitOps inside

Read More ...