1. XYB (Examine Your Buckets)

    On July 19, Twilio was the victim of a hacking attack that made headlines. An attacker uploaded malicious code to an SDK that Twilio maintains. The injected exploit made a victim’s browser load code that was possibly intended to steal information from them as they shopped online.
    Time An icon of a clock Publish Date
    August 6, 2020
    Person An icon of a human figure Authors
    Keith McCanless
    Category An icon of a paper organzier Categories
    Security
    Process
    DevOps
  2. Security the Elephant

    In an ideal world, everyone would build applications with a software development lifecycle (SDLC) that considers security at every step. The security and regulatory space of the application would be understood.
    Time An icon of a clock Publish Date
    May 19, 2020
    Person An icon of a human figure Authors
    Keith McCanless
    Category An icon of a paper organzier Categories
    Security
    Agile
    Process

Search An icon of a magnifying glass Search the Blog