publication

PurpleTeam with Kim Carter

The 6 Figure Developer crew speak with Kim Carter about PurpleTeam, it's composition and how it can help Developers find and fix their web security defects.

DAST with OWASP purpleteam

Justin Beyer speaks with Kim Carter about Dynamic Application Security Testing and how OWASP PurpleTeam can help. Then dives into the composition of PurpleTeam.

OWASP purpleteam

Carl and Richard chat with Kim Carter about purpleteam, an open-source project for testing web applications and APIs as part of your CI/CD pipeline

Michael Hausenblas on Container Networking

Michael Hausenblas and Kim Carter discuss container networking concepts from Michael’s book Container Networking. Covering Kubernetes, service discovery, orchestration, and many other related topics.

Natalie Silvanovich on Attack Surface Reduction

Natalie Silvanovich from Google Project Zero talks with Kim Carter about what attack surface reduction is about.

Cloud Security - Quick Reference

Are you looking to achieve a good understanding of your responsibilities as well as your CSPs responsibilities to make sure your security stature in the Cloud is where you need it to be? Do you need the technical direction required to create your secure Cloud environment? You can think of this book as your technical Cloud consultant.

Péter Budai on End to End Encryption

Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption.

Scott Piper on Cloud Security

Founder of Summit Route / creator of FLAWS, Scott Piper talks with Kim Carter about Cloud Security on Software Engineering Radio.

Docker Security - Quick Reference

Are you looking to improve the security of your Docker deployments? Do you want to confirm you haven't missed any important security aspects in your Docker infrastructure?

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises. First book is complete, second book is content complete and currently in technical review.