Loading...

Follow Binary Blogger on Feedspot

Continue with Google
Continue with Facebook
or

Valid

If you are working in or looking to develop applicaitons for the cloud you probably have heard about serverless and containter deployments. This epsiode talks about the similarities and differences for managing and securing them.  Be aware, be safe. *** Support the podcast with a cup of coffee *** – Ko-Fi Security In Five Don’t […]

The post Episode 476 – Serverless And Container Deployments, What Are They appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The week of April 15th I dedicated every Security In Five podcast episode to DevSecOps and the push to move security left. I was motivated to talk about this push because it’s a concept and challenge I deal with almost daily with my own projects and working with clients. DevSecOps, or DevOps if you are […]

The post DevSecOps Podcast Episodes Recap appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

This week’s tools, tips and tricks talks about the threat modeling tool from OWASP called Threat Dragon. OWASP Threat Dragon Project Page Threat Dragon Website Be aware, be safe. *** Support the podcast with a cup of coffee *** – Ko-Fi Security In Five Don’t forget to subscribe to the Security In Five Newsletter. —————— […]

The post Episode 475 – Tools, Tips and Tricks – DevSecOps – OWASP Threat Dragon appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Building security into a DevSecOps program is not easy, but it is possible. This epsiodegoes over the things you need to do in order to call yourself a DevSecOps program.  Be aware, be safe. *** Support the podcast with a cup of coffee *** – Ko-Fi Security In Five Don’t forget to subscribe to the […]

The post Episode 474 – DevSecOps – Security End To End Is Possbile If You Do This appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

DevSecOps changes in an organization tends to focus on getting everyone adjusted to security. Security professional also have significant growth opportunities they should tackle if they want to be effective in a DevSecOps program. This epsiodetalks about what those changes are.  Be aware, be safe. *** Support the podcast with a cup of coffee *** […]

The post Episode 473 – DevSecOps – Security Professional Have To Evolve To Succeed appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

DevSecOps has security built into it but you cannot acheive that with the traditional way of doing things, at the end. Security needs to move left in the process, earlier and as often as you can. This epsiode goes into the details on how and why this needs to be. Be aware, be safe. *** […]

The post Episode 472 – DevSecOps – Shifitng Security Left appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

DevSecOps is driven, usually, by an agile process. The user stories are what drives the development and in the current SAFE moethodology it’s difficult to get non-functional requirements, espeicallysecurity related, written as user stories. This epsiode talks about how I go about creating user stories to slide them into the backlog so the security is […]

The post Episode 471 – DevSecOps – Writing Security User Stories appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

This week’s tools, tips and tricks talks about one of my favorite security sites grc.com. Specifically the ShieldsUp! service. This epsiode talks about the site and why it should definately be in your bookmark list. Gibson Research Corporation Website ShieldsUp Port Scanner Be aware, be safe. *** Support the podcast with a cup of coffee […]

The post Episode 470 – Tools, Tips and Tricks – Shields Up appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

In information security you may have the term honeypot. They are important tools and technique in the defense of a network or application. This episode details what a honeypot is and how they are used. Source Be aware, be safe. *** Support the podcast with a cup of coffee *** – Ko-Fi Security In Five […]

The post Episode 469 – What Is A Honeypot appeared first on Binary Blogger.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When you are talking about security scanning a network there are two words that you will hear. Passive and Active. This epsiode explains the two. Be aware, be safe. *** Support the podcast with a cup of coffee *** – Ko-Fi Security In Five Don’t forget to subscribe to the Security In Five Newsletter. —————— […]

The post Episode 468 – What Is The Difference Between Passive And Active Monitoring appeared first on Binary Blogger.

Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview