Главная
Study mode:
on
1
Introduction
2
What is CICD
3
Ransomware
4
Michael Hayden
5
Security Practices
6
Red Team Guidelines
7
Capture the Flag
8
Vulnerability Discovery
9
Credentials
10
Antivirus
11
Phishing
12
Second Biggest Vulnerability
13
Open Source Software
14
Equifax
15
WhiteSource
16
Limitations
17
Isolation
18
Regular Deployments
19
Static Code Scanning
Description:
Explore a conference talk from OWASP Global AppSec Tel Aviv that delves into Microsoft's approach to automating security in CI/CD pipelines. Learn about the tools and practices implemented to secure products and services during deployment, as well as valuable lessons learned along the way. Gain insights into various security aspects, including ransomware protection, red team guidelines, vulnerability discovery, credential management, antivirus measures, and phishing prevention. Discover the importance of open source software security, regular deployments, and static code scanning in maintaining a robust security posture. Presented by Sasha Rosenbaum, an Azure DevOps Program Manager at Microsoft, this 31-minute talk offers practical knowledge for enhancing security automation in software development and deployment processes.

Can We Automate Security?

OWASP Foundation
Add to list