Part 3 — Vetting past assumptions
ReThink Security
by
2y ago
This is a multi-part blog series. If you haven’t already I encourage you to read the first two installments: Part 1 - My First 100 Days in ProdSec at a Series E Startup Part 2 - From gates to responsibilities As mentioned in my previous posts, one of the key takeaways from The First 90 days was to understand that past performance and solutions will not necessarily help you in the future. I found this to be strikingly true at Highspot. As a consultant it’s easy to swoop in, find flaws, deliver a report, and move onto the next customer. When you don’t have to sit with your long term decisions or ..read more
Visit website
Part 2 - From gates to responsibilities
ReThink Security
by
2y ago
This is part of a multi-part blog series, if you haven’t already, please check out the first post: Part 1 - My First 100 Days in ProdSec at a Series E Startup In my first blog post I discussed how I found Highspot and what attracted me to this company. I discussed the immediate challenges I faced as I scaled up my own knowledge and tried to rapidly snap to the new culture and demands of my role. If you haven’t read that already I recommend starting there and coming back. In this post I’ll explore the shift in security thinking from security gates in which the security team is viewed as a bottl ..read more
Visit website
My first 100 days in ProdSec at a Series E Startup
ReThink Security
by
2y ago
After working in the application security consulting industry for nearly two decades and helping to solve my clients’ most difficult challenges, it was time to put what I used to tell others into practice. These are my lessons from the first 100 days.  I’ve created security teams, bug bounty programs, set up tooling strategies, hiring plans, and more. I thought I’d hit the ground running and start making an impact on day 1, or at least day 99, while I made some impact early I had a lot to learn. As I passed my 100th day I learned so much about what makes a successful product and a success ..read more
Visit website
AppSec Strategy for AWS Cloud SaaS
ReThink Security
by
3y ago
Purpose The purpose of this document is to outline an application security strategy and roadmap for AWS Cloud SaaS applications, covering both application security concerns as well as AWS specific infrastructure. This is a checklist style article to help start conversations and give you information to perform further research. I’ve referenced other white papers and further reading available for more information throughout. Application Security An effective application security program will reduce security risk associated with code development while keeping disruption to the normal SDLC process ..read more
Visit website
System Design for Security
ReThink Security
by
3y ago
My background is as a developer and a security professional, so when I had to learn System Design I approached it from that perspective. While I was familiar with many of these concepts, I decided that I had to learn it in depth and in earnest. Now that I know more, I’m convinced that every developer and every security professional should understand these concepts. For all of you who are like me and want to learn more, here’s an overview to help you think about system design, coming at it from a mindset of application security. If you are a developer new to System Design, this will introduce y ..read more
Visit website
AppSec Vulnerability Cheatsheet
ReThink Security
by
3y ago
There are a number of places online where you can find details about application security vulnerabilities, but it is surprisingly hard to find a single location that provides a summary of all the most important vulnerabilities to be aware of. While any high-risk vulnerability is worth fixing, It’s worth adding a layer of prioritization around the most common vulnerabilities that are being used in attacks and exploits. The following statistics were reported by Contrast Security. While this is based primarily on what they are seeing with their customers, I think it is generally useful: 65% of a ..read more
Visit website
Phase One of Appsec Engineering: Awareness
ReThink Security
by
3y ago
This is part of a series Introduction Awareness (you are here) Enablement (coming soon) Enforcement (coming soon) Last week I published a post introducing three important phases of AppSec Engineering: Awareness, Enablement, and Enforcement. Over the next three posts I will dive into each of these topics to share best practices and guidelines you can roll out to optimize your security engineering practice. In my experience, the best AppSec programs start with AppSec awareness training. The goal is to provide your product team with enough information to know when they need security involvement ..read more
Visit website
The Three Phases of Appsec Engineering
ReThink Security
by
3y ago
In order for an AppSec team to collaborate effectively with development teams they should think in three phases: Awareness, Enablement, and Enforcement. This month I’ll be dedicating an article to each. The focus of these articles will be on the critically important area of application security, focused on the roles involved in building software: developers (DevOps), testers, and architects. Awareness training arms your team to understand how important security is and when to raise their hand for security support. Application security awareness can start with a series of talks, but the best aw ..read more
Visit website
Mini-post: Stop Acting Like Phishers
ReThink Security
by
3y ago
There are two sides to preventing a successful phishing attack. The first side is focusing on the user; trying to train users to identify phishing attacks and to protect themselves from these types of attacks. Training is important, but there’s a responsibility on the company to act in a way that does not emulate common phishing techniques and set your users up for failure. The second side of the successful phishing attack is the software and technology side. There are many techniques that companies can employ to make it easier for their users to identify fraudulent emails and there are some g ..read more
Visit website
Mini-post: Reducing vulnerability classes to near zero through secure defaults and good choices
ReThink Security
by
3y ago
“If you could wave a magic wand and do anything to reduce vulnerabilities, what would you do?” Some common answers are things like training and education, forcing penetration testing, better tools, and smarter users, but none of these things really strike at the core of the issue. Where is the vulnerability garden? Where are those vulnerabilities planted? Can we make that soil hostile to vulnerabilities and rich for good coding practices? We can. The answer is to make it as hard as possible to introduce vulnerabilities in the first place. The best way to accomplish that is to provide developer ..read more
Visit website

Follow ReThink Security on FeedSpot

Continue with Google
Continue with Apple
OR