Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Fuzzing Web Services | How to Automate Security Testing for Web Applications

Due to their high degree of interconnectivity, web applications are often difficult to secure. In this coding session, Simon Resch demonstrates an approach that allows you to simplify and automate your web application testing using modern fuzzing techniques. Content

How to Keep your Web Applications Secure: Everything you need to know about Fuzzing

In this coding session, Khaled Yakdan will demonstrate how to secure web applications with fuzzing, and explain how fuzz testing can help you to uncover complex security vulnerabilities, such as Denial of Services (DoS) and Uncaught Exceptions, in your source code. Content

Mocking Embedded Systems With Fuzz Data

In this live coding session, Daniel Teuchert shows you how to mock embedded systems with fuzz data. This approach enables you to use the advanced mutation methods of feedback-based fuzzing to simulate the behavior of external sources under realistic circumstances and cover unexpected and unlikely edge cases.

Fuzzing Embedded Systems With Dependencies (for Automotive)

In this recorded live hacking session, Daniel Teuchert, will demonstrate an automated testing approach, that will instantly improve your code coverage and also helps you to protect your automotive software against unexpected edge cases. See full description and use case: page.code-intelligence.com/fuzzing-with-dependencies/20210429

Key Cybersecurity KPIs to Report to the Board

As a CISO, you need to talk to your board members in their language. Here are 2 hacks to do that: Speak in terms of financial cyber risk quantification. Don’t tell them, “I deployed the Prolexic solution to mitigate DDoS attack on 121.1.2.3/24 network.” That won’t make an impact on them. Tell them, “I'm going to save potentially up to $5 million in an outage by spending $200,000 on a device to mitigate ransomware attacks.” Compare your organization with competitors.

Enable Faster Business Growth

Improving your organization’s cybersecurity posture increases trust with your clients and partners, and enables faster business growth. In times of economic uncertainty when budgets tighten, it’s critical to make that connection. In this video series, SecurityScorecard Co-Founder and Chief Operating Officer Sam Kassoumeh shares tips from our ebook, 5 Ways to Secure Your Organization in Turbulent Times, on how security teams can reduce risk by over 85% while ensuring that security investments deliver tangible value.

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

Meet the Best Hackers: Shuchita Mishra and Parth Shukla | SnykWeek Boston

During SnykWeek Boston, Shuchita Mishra and Parth Shukla were crowned the best hackers by fixing the most vulnerabilities during our fix challenge. Check out our interview with them to learn about the passion for developer security and what they loved most about Snyk.