“Shift left” is the concept of implementing security from the very beginning and continuously validating that the product is secure. This article is about how to shift security left, based on my experience with very large commercial payment applications and how I helped secure them.
Tag Archive: Products
What we know and don’t know about the security implemented by Skype and whether Skype calls can be intercepted.
Test your anti-virus software with the EICAR test file and see if it is doing its job properly.
Interesting results form the Anti-Phishing Working Group survey shows that LAMP is the most hacked environment.
More information on how the RSA breach started and spread within one of the biggest security companies in the world.