Главная
Study mode:
on
1
Intro
2
Overview
3
Shifting left
4
Security responsibilities
5
Innerloop
6
Tax waste
7
Static analysis
8
Software composition analysis
9
Security as code
10
Innerloop vs outer loop
11
Tools in the outer loop
12
Continuous security lenders
13
Conclusion
Description:
Explore the next evolution of "shift left" security in this 50-minute LASCON conference talk. Discover the concept of inner and outer loops as a more effective approach to application security. Learn how to empower developers to build secure-by-design products, reduce costs, and improve return on investment. Examine the limitations of traditional shift left methodologies and delve into inner-loop concepts, including static analysis, software composition analysis, and security as code. Compare inner-loop and outer-loop tools, discuss continuous security lenders, and gain insights on minimizing tax waste in the development process. Gain a fresh perspective on security responsibilities and how to integrate them effectively into the software development lifecycle.

Introduction to Inner-Loop Security - Shifting Left, but Better

LASCON
Add to list
0:00 / 0:00