๐Ÿ”’ Big improvements to calls in Signal: call links

๐Ÿ”’๐Ÿฅƒ Hey, you know how security teams are the worst and nobody wants to work with them?

Anyway, this is a signed going away present from the engineering platform and architecture leaders.

Definitely a keeper, even after itโ€™s empty.

GlenDronach port wood bottle. โ€œThanks for everything. Good luck!โ€ signed by 10 people in silver marker.

๐Ÿ”’ Iโ€™m at the CSO Conferencece and Awards.

Tomorrow, my team will be accepting a CSO50 award for our security automation platform that supports 4000 engineers and 7000 applications.

Iโ€™ve since left the company, but am here supporting my previous team. Proud of them!

๐Ÿ”’ Banks: practice internet safety!

Also banks: we wonโ€™t let you login if you are blocking junk in your browser or using a VPN

๐Ÿ”’ The opportunity: application threat modeling & secure design review is one of the highest value appsec/prodsec activities, but is hard to implement efficiently and at scale.

A bad solution: provide a long list of controls that need to be checked each time

A better solution: generate relevant security requirements automatically based on whatโ€™s being built

Met with primesec yesterday, and this is what they are trying to do! They are using LLM to read whatโ€™s in your user stories (etc.), summarizing the work for the security team, and injecting specific security control requirements.

If this catches even a small portion of the real requirements, it would be a major uplift for teams both from a security and efficiency perspective. Looking forward to checking it out.

๐Ÿ”’ Met with the folks from Pangea yesterday.

Looks like it could be an interesting solution for:

  • small developer orgs that donโ€™t have time or expertise to deal with common security needs
  • large developer orgs that need consistency, scale, and governance of their security capabilities

๐Ÿ”’ Just left Silicon Valley Bank.

Did not know they still existed!

Iโ€™m at AppSec San Francisco this week.

Mute that โ€œ๐Ÿ”’โ€ tagmoji if you donโ€™t want to hear about it.

Send me a message if you want to meet up.

๐Ÿ”’ OSS backdoors: the folly of the easy fix - lcamtufโ€™s thing

Even when it comes to lesser threats, the bottom line is that we have untold trillions of dollars riding on top of code developed by hobbyists. The companies profiting from this infrastructure can afford to thoroughly vet and monitor key dependencies on behalf of the community. To be sure, a comprehensive solution would be a difficult and costly undertaking โ€” but itโ€™s not any harder or costlier than large language models or self-driving cars.