Software engineers focus on releasing software as fast as possible. To speed up the process, development teams often take advantage of modular code from open-source repositories, third-party vendor scripts or common libraries that are freely available. Unfortunately, this could end up unintentionally introducing malicious JavaScript that may expose the whole environment to security vulnerabilities -- sometimes immediately or at a later time when the code’s origin has been long forgotten. This code from bad actors often hides in what many developers assume to be reputable sources.
In this Tech Talk, we will discuss:
-How to identify JavaScript that is malicious
-Differences between security scanners and security monitors
-Ways to eliminate the tension between Security Teams, DevSecOps and Developers
You’ll walk away from this session with new ideas that you can put into practice quickly, so invite your team. The first 50 attendees will also receive a $20 gift card to use online with a PerimeterX customer.