{"id":3276,"date":"2015-10-28T16:25:46","date_gmt":"2015-10-28T23:25:46","guid":{"rendered":"http:\/\/codecurmudgeon.com\/wp\/?p=3276"},"modified":"2015-10-28T16:25:46","modified_gmt":"2015-10-28T23:25:46","slug":"halloween-security-slashers-webinar","status":"publish","type":"post","link":"https:\/\/codecurmudgeon.com\/wp\/2015\/10\/halloween-security-slashers-webinar\/","title":{"rendered":"Halloween Security Slashers Webinar"},"content":{"rendered":"<div id=\"attachment_3277\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/codecurmudgeon.com\/wp\/wp-content\/uploads\/2015\/10\/halloween-webinar.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3277\" class=\"size-medium wp-image-3277\" src=\"http:\/\/codecurmudgeon.com\/wp\/wp-content\/uploads\/2015\/10\/halloween-webinar-300x167.png\" alt=\"Halloween themed software security webinar\" width=\"300\" height=\"167\" srcset=\"https:\/\/codecurmudgeon.com\/wp\/wp-content\/uploads\/2015\/10\/halloween-webinar-300x167.png 300w, https:\/\/codecurmudgeon.com\/wp\/wp-content\/uploads\/2015\/10\/halloween-webinar-672x372.png 672w, https:\/\/codecurmudgeon.com\/wp\/wp-content\/uploads\/2015\/10\/halloween-webinar-900x500.png 900w, https:\/\/codecurmudgeon.com\/wp\/wp-content\/uploads\/2015\/10\/halloween-webinar.png 964w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3277\" class=\"wp-caption-text\">Halloween themed software security webinar<\/p><\/div>\n<p>I&#8217;m doing a Halloween themed <a title=\"Parasoft home page\" href=\"http:\/\/www.parasoft.com\" target=\"parasoft\">Parasoft<\/a> webinar this Friday on <em>Stopping Software Security Slashers with Static Analysis<\/em>. As always it&#8217;s a free webinar and you can register <a href=\"https:\/\/attendee.gotowebinar.com\/register\/4330546762513551361\" target=\"parasoft\" title=\"Webinar registration\">here<\/a>. <\/p>\n<p>We like to have fun at these holiday webinars, so we&#8217;ll investigate how some security issues are similar to the famous horror movie villains you know and love, like <a href=\"http:\/\/amzn.to\/1Hcwf2j\" target=\"amazon\" title=\"Friday the 13th\">Jason<\/a>, <a href=\"http:\/\/amzn.to\/1M2xQxl\" target=\"amazon\" title=\"A Nightmare on Elm Street\">Freddy<\/a>, <a href=\"http:\/\/amzn.to\/1SabB9n\" target=\"amazon\" title=\"The Texas Chain Saw Massacre\">Leatherface<\/a>, <a href=\"http:\/\/amzn.to\/1HcwR8d\" target=\"amazon\" title=\"Halloween\">Michael<\/a> and <a href=\"http:\/\/amzn.to\/1M2xXcj\" target=\"amazon\" title=\"Psycho\">Norman<\/a>. I hope to see you there.<\/p>\n<h2>Overview<\/h2>\n<p>Stagefright, Heartbleed, and other grisly-sounding software defects are scary for good reason: they make applications vulnerable to menacing cyberattackers\u2014no hockey mask or knife-fingered glove required. In the absence of an adequate defect prevention strategy, your application is likely to stumble as malicious (and even not so malicious) hackers bear down on vulnerabilities, potentially crashing the software or exposing sensitive data. If your software is deployed to a medical device, automotive system, or any other safety-critical application, this is only the beginning of the nightmare. <\/p>\n<p>But your application deployment doesn\u2019t have to end in gruesome horror. By implementing quality practices, such as a <span class=\"explanatory-dictionary-highlight\" data-definition=\"explanatory-dictionary-definition-65\">static analysis<\/span>, throughout the SDLC, you reduce the potential attack surface cyberattackers <span class=\"explanatory-dictionary-highlight\" data-definition=\"explanatory-dictionary-definition-10013\">can<\/span> exploit. Moreover, by automating the continuous application of defect prevention technologies, you eliminate the possibility of defects recurring like a chainsaw-wielding maniac that won\u2019t stay down. <\/p>\n<p>In this webinar, we\u2019ll look at why recently publicized defects are so scary and discuss how to take a proactive approach to ensuring the safety, security, and reliability of your applications. We\u2019ll focus on how to leverage standards, such as OWASP, PCI DSS, and <span class=\"explanatory-dictionary-highlight\" data-definition=\"explanatory-dictionary-definition-8\">CWE<\/span>, to evolve development policies from <span class=\"explanatory-dictionary-highlight\" data-definition=\"explanatory-dictionary-definition-65\">static analysis<\/span> findings so that your application isn\u2019t the next victim. <\/p>\n<p><i>Resources<\/i><\/p>\n<ul>\n<li><a href=\"http:\/\/www.amazon.com\/gp\/product\/0071626751\/ref=as_li_tl?ie=UTF8&#038;camp=1789&#038;creative=390957&#038;creativeASIN=0071626751&#038;linkCode=as2&#038;tag=codecurmu-20&#038;linkId=YP3TOBZCVCTPHZZU\">24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them<\/a><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ir-na.amazon-adsystem.com\/e\/ir?t=codecurmu-20&#038;l=as2&#038;o=1&#038;a=0071626751\" width=\"1\" height=\"1\" border=\"0\" alt=\"\" style=\"border:none !important; margin:0px !important;\" \/><\/li>\n<li><a href=\"http:\/\/www.amazon.com\/gp\/product\/020172152X\/ref=as_li_tl?ie=UTF8&#038;camp=1789&#038;creative=390957&#038;creativeASIN=020172152X&#038;linkCode=as2&#038;tag=codecurmu-20&#038;linkId=2MWCATLREVGGE6DL\">Building Secure Software: How to Avoid Security Problems the Right Way<\/a><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ir-na.amazon-adsystem.com\/e\/ir?t=codecurmu-20&#038;l=as2&#038;o=1&#038;a=020172152X\" width=\"1\" height=\"1\" border=\"0\" alt=\"\" style=\"border:none !important; margin:0px !important;\" \/>\n<\/li>\n<li><a href=\"http:\/\/www.amazon.com\/gp\/product\/032150917X\/ref=as_li_tl?ie=UTF8&#038;camp=1789&#038;creative=390957&#038;creativeASIN=032150917X&#038;linkCode=as2&#038;tag=codecurmu-20&#038;linkId=XQD3RZSZUBPDTJMB\">Software Security Engineering: A Guide for Project Managers<\/a><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ir-na.amazon-adsystem.com\/e\/ir?t=codecurmu-20&#038;l=as2&#038;o=1&#038;a=032150917X\" width=\"1\" height=\"1\" border=\"0\" alt=\"\" style=\"border:none !important; margin:0px !important;\" \/>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m doing a Halloween themed Parasoft webinar this Friday on Stopping Software Security Slashers with Static Analysis. As always it&#8217;s a free webinar and you can register here. We like to have fun at these holiday webinars, so we&#8217;ll investigate how some security issues are similar to the famous horror movie villains you know and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[131,123,20,132],"class_list":["post-3276","post","type-post","status-publish","format-standard","hentry","category-security","tag-appsec","tag-cybersecurity","tag-staticanalysis","tag-swsec"],"_links":{"self":[{"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/posts\/3276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/comments?post=3276"}],"version-history":[{"count":6,"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/posts\/3276\/revisions"}],"predecessor-version":[{"id":3284,"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/posts\/3276\/revisions\/3284"}],"wp:attachment":[{"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/media?parent=3276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/categories?post=3276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codecurmudgeon.com\/wp\/wp-json\/wp\/v2\/tags?post=3276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}