Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Auditing Your Security Program with Roddy Bergeron - Secrets of AppSec Champions Podcast

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Stress, Certification, and Pen Testing: Nathaniel Shere's Journey - Secrets of AppSec Champions

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Empowering Teams for Better Security: A Conversation with Jigar Shah - Secrets of AppSec Champions

Developing a Security Culture: In today's highly digital and interconnected world, cybersecurity isn't just an IT issue; it's everyone's responsibility. Creating a robust security culture within your organization involves integrating security awareness into your daily operations. Train your employees, provide adequate resources, and define clear roles and responsibilities for security champions and influencers.

Shifting From Reactivity to Proactivity in AppSec with Phil Guimond - Secrets of AppSec Champions

"In Episode 03 of the SAC | Secrets of AppSec Champions podcast titled ""Compromised: Proactive to Reactive,"" hosts Chris Lindsey and guest Phil Guimond tackle the critical distinctions between proactive and reactive security strategies. They emphasize the importance of access logging and visibility in detecting compromises early, pointing out how changes in access logs can signal potential threats. They stress the necessity of implementing secure, tamper-proof log storage and discuss automation solutions like the ""Have I Been Pwned"" API and CAPTCHA to mitigate risks such as account takeovers.