BackslashSec Profile Banner
Backslash Security Profile
Backslash Security

@BackslashSec

Followers
117
Following
10
Media
200
Statuses
341

The first Cloud-Native #ApplicationSecurity solution for enterprise #AppSec teams to provide unified security and business context to cloud-native code risk.

Tel Aviv, Israel
Joined March 2023
Don't wanna be here? Send us removal request.
@BackslashSec
Backslash Security
9 months
๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ & ๐—ฅ&๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—”๐—น๐—ถ๐—ด๐—ป ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ป๐—ผ๐˜ƒ๐—ฎ๐˜๐—ถ๐—ผ๐—ป. Bridge the gap between AppSec and R&D with clear steps to streamline workflows and foster collaboration. ๐Ÿ‘‰
Tweet card summary image
backslash.security
Are you feeling stuck in a perpetual "tug of war" between AppSec and development teams? Struggling to balance risk management, compliance, and security mandates with the need for speed and agility?...
0
0
0
@BackslashSec
Backslash Security
9 months
๐—™๐—ฟ๐—ฒ๐˜€๐—ต ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐—ถ๐—ฑ๐—ฒ๐—ฎ๐˜€, ๐—ฎ๐—ป๐˜†๐—ผ๐—ป๐—ฒ?. Our CEOโ€™s, Shahar Man latest @TheHackersNews article explores how to revitalize application security practices for todayโ€™s challenges. Dive in:
Tweet card summary image
thehackernews.com
AppSec teams face alert overload from outdated tools. Discover modern solutions prioritizing real threats
0
0
0
@BackslashSec
Backslash Security
9 months
PR gates are great for verifying code changes, but letโ€™s be realโ€”theyโ€™re not a true defense mechanism. In our latest research, we conducted an extensive analysis of popular npm packages with over 1,000,000 yearly downloads. ๐Ÿ“– Check out our findings:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
9 months
๐Ÿคฏ ๐—ข๐—ป ๐—ฎ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—ด๐—ฒ, ๐—ถ๐˜ ๐˜๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—ท๐˜‚๐˜€๐˜ ๐—ผ๐—ป๐—ฒ ๐˜†๐—ฒ๐—ฎ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ฎ ๐—ฝ๐—ฎ๐—ฐ๐—ธ๐—ฎ๐—ด๐—ฒ ๐˜๐—ผ ๐—ฏ๐—ฒ๐—ฐ๐—ผ๐—บ๐—ฒ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ. While PR scanning is a crucial part of application security, itโ€™s not enough. Read our full findings here:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
9 months
๐Ÿค” ๐—œ๐˜€ ๐—ฃ๐—ฅ ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—˜๐—ป๐—ผ๐˜‚๐—ด๐—ต?.New research from our team reveals a major security gap: PR gates often catch very little, and most OSS vulnerabilities are discovered long after code is merged. Read the research:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
9 months
๐—š๐—ผ ๐—ฏ๐—ฒ๐˜†๐—ผ๐—ป๐—ฑ ๐—ฏ๐—ฎ๐˜€๐—ถ๐—ฐ ๐—ฆ๐—–๐—” ๐—ฎ๐—ป๐—ฑ ๐—ฆ๐—”๐—ฆ๐—ง!. With advanced reachability analysis, phantom package detection, and powerful remediation capabilities. See it in action:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
9 months
๐Ÿ–– ๐—ฆ๐˜๐—ฎ๐—ฟ ๐—ง๐—ฟ๐—ฒ๐—ธ ๐—ณ๐—ฎ๐—ป๐˜€, ๐˜†๐—ผ๐˜‚ ๐—ธ๐—ป๐—ผ๐˜„ ๐˜๐—ต๐—ฒ ๐—บ๐—ผ๐—บ๐—ฒ๐—ป๐˜. For too long, AppSec has been stuck in 2D scanning, unable to truly see the full picture. Itโ€™s time to rethink AppSec:
0
0
0
@BackslashSec
Backslash Security
9 months
๐Ÿ“– The AppSec & R&D Playbook: Aligning Security and Innovation.โœ… Overcome common barriers between AppSec and R&D.โœ… Manage Risk in Security and R&D Collaboration.โœ… Build a sustainable, collaborative model.Get it now:
Tweet card summary image
backslash.security
Are you feeling stuck in a perpetual "tug of war" between AppSec and development teams? Struggling to balance risk management, compliance, and security mandates with the need for speed and agility?...
0
0
0
@BackslashSec
Backslash Security
9 months
Catch Shahar Man and James Berthoty in this about:.โœ… The differences between ASPM and Code Security.โœ… How CNAPP vendors are stepping into the AppSec arena.โœ… Debunking myths about shift-left strategies.๐Ÿ‘‰Watch it now:
0
0
0
@BackslashSec
Backslash Security
9 months
๐Ÿ˜ฌ Struggling with #FedRAMP and #FISMA compliance? We get it! .Navigating rigorous security requirements, key controls, and meeting strict timelines can be overwhelming. See how Backslash aligns with key controls and helps streamline compliance efforts:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
The AppSec & R&D Playbook is designed to empower security and development leaders with proven, actionable steps to:.โœ… Build efficient workflows.โœ… Strengthen security without slowing down innovation.โœ… Foster collaboration .๐Ÿ“ฉ Download the playbook now :
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿ› ๏ธBackslash provides comprehensive PR comments on GitHub, listing every finding that violates your policies. All policy violations are clearly outlined within the PR, making them easy to review and address without leaving GitHub. โœ….See it in action:
Tweet media one
Tweet media two
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿš€ Simplify Your FedRAMP & FISMA Compliance Journey!.Tackling the strict security requirements, lengthy timelines, and resource-heavy processes of FedRAMP and FISMA is overwhelming. We are here to help! ๐Ÿ‘‰ #FedRAMP #FISMA #AppSec
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
Shahar Man, Backslash CEO, shares with @TheHackersNews his take on breathing fresh life into stagnant AppSec initiatives. Check it out here:
Tweet card summary image
thehackernews.com
AppSec teams face alert overload from outdated tools. Discover modern solutions prioritizing real threats
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿš€ ๐—›๐—ผ๐˜ ๐—ผ๐—ณ๐—ณ ๐˜๐—ต๐—ฒ ๐—ฝ๐—ฟ๐—ฒ๐˜€๐˜€! ๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ & ๐—ฅ&๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ ๐Ÿš€Letโ€™s be realโ€”AppSec and R&D can sometimes feel like theyโ€™re playing two different games: oneโ€™s on defense, the otherโ€™s all offense. This eBook is your game plan:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿ“– Check out our new blog!.๐—จ๐—ป๐˜๐—ฎ๐—ป๐—ด๐—น๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐— ๐—ฒ๐˜€๐˜€: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€. ๐Ÿ‘‰
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿ†๐Ÿ†๐Ÿ† Backslash Security just won Most Innovative Application Security Solution at the 2024 InfoSec Innovator Awards by @cyberdefensemag !.Weโ€™re redefining AppSec from the ground upโ€”not just โ€œnext-genโ€ but a truly fresh approach. See it in action:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿ“… ๐˜–๐˜ฏ๐˜ญ๐˜บ 1 ๐˜ธ๐˜ฆ๐˜ฆ๐˜ฌ ๐˜ต๐˜ฐ ๐˜จ๐˜ฐ! ๐Ÿ“…. Don't miss this 30-minute session, where we'll get straight to the heart of today's hottest topics in AppSec! Join James Berthoty, Founder of Latio Tech, and Shahar Man, CEO of Backslash Security. Register here:
Tweet media one
0
0
0
@BackslashSec
Backslash Security
10 months
๐Ÿšจ Why Does Software Composition Analysis (SCA) Suck? ๐Ÿšจ.Using real examples, James Berthoty shows the tricky side of fixing vulnerabilities and highlights how reachability analysis (with a little help from Backslash!) can cut out the unnecessary work. ๐Ÿ‘‰
0
0
0
@BackslashSec
Backslash Security
11 months
๐Ÿ‘€ Interesting read from Backslash Security's CTO, Yossi Pik, on the hidden risks of trusting AI-generated code. ๐Ÿ‘‰ Check out the full article: #AI #AppSec #CodeSecurity.
Tweet card summary image
techradar.com
The double-edged sword of coding with generative AI
0
0
0