James Jardine
@JardineSoftware
Followers
1K
Following
1
Media
32
Statuses
3K
Application Security Professional. I focus on helping organizations get more value from their application security program.
Jacksonville, FL
Joined October 2010
This is a good example of how what we do in security is not much different than any other challenges we face.
Ep. 125: From Flat Tires to AppSec: The Power of Tools and Processes has just been released. Just like changing a flat tire, the right tools, process and knowledge can make all the difference in a successful outcome. https://t.co/r4Egx8maXq
0
0
0
Just posted Ep. 123: Goals of Security Culture - Sort of? I share some thoughts on how security is a part of everyone's roles and some ideas of how to help build that awareness. https://t.co/fPnK9LMiQM
0
2
0
Should secure development be part of a developer's required skillset / experience? Ep. 122: Integrating Security Responsibilities into Development has just been released!! Check out the full episode: https://t.co/NXoW3AamqR
0
1
0
It is no longer just the company paying, ransomware attacks are coming after your money. James: "They are sending out emails directly to those patients, those users and demanding, in this case it was $213 US dollars that they had to pay within 24 hours." Full Video:
1
2
1
Ep. 121: Evolving Ransomware: Unique Tactics for Payment is now available. Check out some unique tactics we have seen used to collect payment. https://t.co/uzufJhk2JN
0
2
0
Our PSIRT team has an opening! ServiceNow is the best place I've ever worked. The PSIRT team is doing some really interesting work - take a look at the role: Staff Product Security Engineer | Web App Vulnerabilities https://t.co/qxDTyb5waW via @servicenow
#hiring #psirt
0
1
0
if you are using Firebase, here is their security checklist:
firebase.google.com
Review this checklist of guidelines to help keep your Firebase resources and your users' data secure.
0
1
0
Does the ASP:TextBox TextMode provide input validation? I posted some information about what that attribute does and does not do. https://t.co/pqVJwmAO4P
0
0
1
If you are using HAR files, this is a valuable resource.
Do you use HAR files for troubleshooting? Whether you are the person receiving the HAR file or sending it, it is important that it doesn't contain sensitive information. Cloudflare has made a HAR sanitizer available. https://t.co/1cjVdyjbK8.
0
0
0
What do y’all think of the new bumpers? You like? You love? Leave an iTunes review/rating if you can, please, it helps give suggestions to others and makes it easier to find the show. Thank you! @Wh1t3Rabbit @JardineSoftware
0
1
0
Great episode, with a topic worth revisiting, and of course the best guests in the industry. @shawnetuma @Wh1t3Rabbit @JardineSoftware
Shawn Tuma was recently featured on an episode of the @DtSR_Podcast, commencing his quarterly cybersecurity segment with Sean Scranton. Listen now. https://t.co/7mvSIYDDKz
0
3
4
🎙️Solving #SecretZero," decrypting "distributed fragmented crypto" (which is a bit mind-blowing) and the art of #SecretsManagement with @akeylessio @OdedHareven on the latest @DTSR_Podcast with @Wh1t3Rabbit and @JardineSoftware 🎧 Tune in! https://t.co/ktFTYYfPxI
0
1
0
Catch a live recording of the #DtsR podcast as we record it - https://t.co/h4YLUmTRcJ Check us out! #live #youtube @Wh1t3Rabbit @JardineSoftware @domvogel
linkedin.com
Surprise! About to record a #DtSR Podcast with Dominic Vogel talking about #SMB and #cybersecurity. The podcast comes out in 2 weeks, but you're welcome to join the live-feed as we record here on...
0
2
2
Stack traces and other error information are often seen as low risk, but there are those outliers where it can be much more. https://t.co/peYCzOb3UN
thehackernews.com
Microsoft reveals how China-based threat group Storm-0558 compromised an engineer's corporate account that led to the theft of an Outlook signing key.
0
2
0
Episode 565 of the @DtSR_Podcast is LIVE! Check it out, this week @Wh1t3Rabbit & @JardineSoftware host the one and only Jim TIller. YouTube link: https://t.co/aBJkd6vhSQ Pod (audio) link:
0
3
0
Curious why you can't just rely on client-side validation? Check out this quick post.
0
2
0
Private secrets, keys and tokens are a common issue in code repositories. GitHub just added a feature to help detect/block these on push requests. https://t.co/0raH0J018z
#cybersecurity, #appsec
bleepingcomputer.com
GitHub is now automatically blocking the leak of sensitive information like API keys and access tokens for all public code repositories.
0
0
1
Ep. 120: Addressing Root Cause - Vuln Components Thoughts on addressing the root cause vs. symptoms
0
0
1
What is the biggest change you have seen in application security over the past 5 years?
0
0
1
If you are using S3 buckets, make sure you have them appropriately configured and also that you are not storing protected data in public buckets.
theregister.com
Educator gets an F for security
0
0
1