Content tagged as 'Application-Security'

Here is a list of all the content that has been tagged as application-security.

Who Devs Wins

Twelve Jade Development Teams go head-to-head in the Jade Secure Coding Tournament

Workshop - Init Security Titans

Workshop to initialise, train and deploy the Jade Security Champions across the Jade Development Teams.

Talk - Hardening Your Docker Infrastructure

The security defaults of Docker are designed to get you up and running (“just work”) quickly, rather than being the most secure. There are many default configurations that can be improved upon. In this talk Kim will walk through improving the security of Docker hosts, containers, networking and deployments.

Natalie Silvanovich on Attack Surface Reduction

Natalie Silvanovich from Google Project Zero talks with Kim Carter about what attack surface reduction is about.

purpleteam

Automated security regression testing of your web applications and APIs, no setup required. 1. Write [test conditions](https://f0.holisticinfosecforwebdevelopers.com/chap06.html#process-and-practises-agile-development-and-practices-evil-test-conditions) - convert to [Cucumber](https://cucumber.io/) 2. Provide minimal configuration 3. Consume node CLI package 4. Run single command `purpleteam test` Perfect for your CI/nightly build

Cloud Security

Discussion about Kim's new book on Cloud Security, some of the content, and links to other useful resources around securing your Cloud environments.

Cloud Security - Quick Reference

Are you looking to achieve a good understanding of your responsibilities as well as your CSPs responsibilities to make sure your security stature in the Cloud is where you need it to be? Do you need the technical direction required to create your secure Cloud environment? You can think of this book as your technical Cloud consultant.

Docker Security

Discussion about Kim's new [book on Docker Security](/publication/docker-security/), some of the content, and links to other useful resources around securing your Docker deployments.

Péter Budai on End to End Encryption

Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption.

Workshop - Building Security Into Your Development Teams

Kim's flagship Software Developer focussed training, this time at OWASP New Zealand Day conference.