TechTarget and Informa Tech's Digital Businesses Combine.
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.
How to Build a Blueprint for Secure Software
Presented by
Daniel Shugrue, Lead Product Marketer at Digital.ai, and Cole Herzog, Engineering Manager at Digital.ai
About this talk
Application Developers are increasing taking the “DevSecOps” ethos to heart. They are realizing that security is not just something that gets bolted onto apps or around networks. Instead, security needs to be built into the applications that they create. While many have turned to SAST solutions to identify vulnerabilities such as Log4Shell in Log4J, others rightfully wonder how to protect the code that they write themselves, code that – by definition – contains working examples of how to penetrate the security perimeter that their InfoSec colleagues have put in place.
This webinar shows:
* How threat actors reverse engineer applications
* How a “Protection Blueprint” secures applications
* What unobfuscated and disassembled machine code looks like to a threat actor
* How obfuscated machine code makes the threat actor’s job more difficult
* What anti-tamper measures do to prevent reverse engineering of applications