puma_scan Profile Banner
Puma Security Profile
Puma Security

@puma_scan

Followers
309
Following
90
Media
154
Statuses
328

Experts in Cloud Security, DevOps, creators of Puma Scan. Let us help your team create and deliver secure software. #SecDevOps #CloudSecurity

West Des Moines, IA
Joined September 2016
Don't wanna be here? Send us removal request.
@puma_scan
Puma Security
4 years
RT @absoluteappsec: Absolute AppSec will be live tomorrow (12PM ET) with @sethlaw and a magnanimously guest-hosting @lojikil. Meanwhile, en….
0
3
0
@puma_scan
Puma Security
4 years
We are excited to announce a new feature in the Puma Scan Professional v1.1 release: @sonatype OSS Index Integration. Learn how to start scanning for vulnerable dependencies here:
Tweet media one
Tweet media two
0
0
4
@puma_scan
Puma Security
4 years
Get your hands on a copy of Visual Studio 2019 Tricks & Techniques by @PaulBSchroeder & @curea. It features our favorite security tool, @puma_scan #pumascan #pumasecurity #visualstudio #securecoding
Tweet media one
0
3
4
@puma_scan
Puma Security
5 years
Unsure of your cloud architectures' security? Contact us and we’ll get you on the right path. Our security engineers will help build and harden your cloud infrastructure!
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
Upgrades to Puma Scan Professional are available! #Azure, Server & End User tools include an upgrade of the #.NET Compiler API to v3.0 to enable scanning of C# 8.0 projects. More information can be.found at
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
Upgrades to Puma Scan Professional #Azure #Server & End User tools are available now! This includes: migration of the entire analysis engine to #.NET standard to support scanning cross platform. More information is found at
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
Puma Scan Professional for #VSCode provides real time security scanning on macOS and Linux. Like #VSCode, Puma Scan is extremely light with great performance. Find out more at:
Tweet media one
0
0
1
@puma_scan
Puma Security
5 years
Our new product, Puma Scan Professional End User Edition now integrates with Visual Studio Code, a cross platform – Windows, Mac or Linux code editor from Microsoft. Contact us to get set up today! sales@pumascan.com.
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
Puma Security, LLC, Puma Scan now offers End User Edition in #VSCode - Contact us! sales@pumascan.com
Tweet media one
1
0
1
@puma_scan
Puma Security
5 years
Examine real-world scenarios that security professionals encounter defending Cloud workloads running on Serverless Infrastructure. 👉 #DevSecOps
Tweet media one
0
3
6
@puma_scan
Puma Security
5 years
Security control is rarely utilized in test driven development. Coach your DevOps teams and developers to make security units tests the foundation of your test driven development. They are easy to write and maintain. Teams should strive for high code coverage in vulnerable areas.
Tweet media one
0
1
0
@puma_scan
Puma Security
5 years
Get faster Security Unit Testing feedback while building strong security checks in the #DevOps Pipeline. We provide the insight, consulting and customization necessary to enable secure product delivery.
Tweet media one
0
0
1
@puma_scan
Puma Security
5 years
Don't let the following Cloud Security Responsibilities be a burden: VPC Endpoint policies to block external resource access, audit logs for theft & API anomalies, EC2 to disable Instance Metadata Service v1. We can simplify this for you! Visit:
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
Avoid falling victim to the #Cloud. Vulnerabilities occur when an application requests data from an untrusted URL location. Follow customer Cloud Security Responsibilities by writing secure code, no SSRF, enforcing least privilege execution IAM roles & configuring VPC Endpoints.
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
We can help you avoid falling victim to #Cloud. Server-side Request Forgery vulnerabilities occur when an application requests data from an URL that is supplied from an untrusted location, including: request parameters, web services and backend systems.
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
We can help you avoid falling victim to #Cloud. Server-side Request Forgery vulnerabilities occur when an application requests data from an URL that is supplied from an untrusted location, including: request parameters, web services and backend systems.
Tweet media one
0
0
1
@puma_scan
Puma Security
5 years
We can help you avoid falling victim to #Cloud. Server-side Request Forgery vulnerabilities occur when an application requests data from an URL that is supplied from an untrusted location, including: request parameters, web services and backend systems.
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
We can help you avoid falling victim to #Cloud. Server-side Request Forgery vulnerabilities occur when an application requests data from an URL that is supplied from an untrusted location, including: request parameters, web services and backend systems.
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
We can help you avoid falling victim to #Cloud. Server-side Request Forgery vulnerabilities occur when an application requests data from an URL that is supplied from an untrusted location, including: request parameters, web services and backend systems.
Tweet media one
0
0
0
@puma_scan
Puma Security
5 years
We can help you avoid falling victim to #Cloud. Server-side Request Forgery vulnerabilities occur when an application requests data from an URL that is supplied from an untrusted location, including:.request parameters, web services and backend systems.
Tweet media one
0
0
0