Veracode is shifting container security left in a developer friendly way, scanning for OSS vulns on all layers, configuration (Kubernetes manifests, Helm charts, Pod Security Standards/Policies, Terraform, CloudFormation, AWS CIS 1.2), and secrets. containerjournal.com/feature…
I'm looking forward to discussing cyber hygiene and cyber resilience on stage at Microsoft Ignite with @vasujakkal next week. You can sign up for an in person or virtual ticket here: aka.ms/ignite-security-fy23
Op 29 september organiseren we weer een #DevNetNoord meetup met vier prachtige sessies, waaronder @nielstanis met zijn sessie ' #Securing your .NET application software #SupplyChain'. Check voor het hele programma en hoe je je kan aanmelden: buff.ly/3JFKMLV#Dotnet
World's oddly relaxed about recent CSRF bypass in csurf express middleware. It does require cookie tossing which limits the blast radius but for multi-tenant apps using subdomains it could be deadly -> fortbridge.co.uk/research/cs….
Definitely stoked about the fact I'll be traveling to Sydney in October and doing two sessions at NDC Sydney! I'm going to talk about sandboxing .NET assemblies and of course supply-chain security.
ndcsydney.com/speakers/niels…#ndcsydney@NDC_Conferences
Following @lorenc_dan’s thread on vulnerability scanners, I wanted to share what I think is a core problem in this space: CPEs.
They’re broken right now, but could be better in the future. 🧵
nvd.nist.gov/Products/CPE
I'm excited to announce that the SLSA3 Generic Generator for GitHub Actions is now generally available! Generate SLSA provenance for any language or custom Actions workflow and help secure OSS supply chains!
slsa.dev/blog/2022/08/slsa-g…
Op 29 september organiseren we weer een #DevNetNoord meetup met vier prachtige sessies, waaronder @nielstanis met zijn sessie ' #Securing your .NET application software #SupplyChain'. Check voor het hele programma en hoe je je kan aanmelden: buff.ly/3JFKMLV#Dotnet
"Password expiration requirements do more harm than good, because these requirements make users select predictable passwords"
Thank you Microsoft. NIST agrees. Everyone who attacks password auth agrees. Can we get compliance to update their requirements.
docs.microsoft.com/en-us/mic…