aquaevitae.blogspot.com
Manos que construyen sueños: abril 2011
http://aquaevitae.blogspot.com/2011_04_01_archive.html
Manos que construyen sueños. Viernes, 22 de abril de 2011. Si nos haces cosquillas. 191;No nos vengamos? Enviar por correo electrónico. Jueves, 21 de abril de 2011. Querida filosofía: GRACIAS POR EXISTIR. Enviar por correo electrónico. 191;Sabes una cosa? Estas vivo, estas viviendo, no tienes ningún tipo de problema o enfermedad grave, eres muy simpático. eres muy agradable! 191;Quieres saber más? Y, depende que situaciones, no te dejes llevar. los planes, planes son! Escribe en un folio todo lo que en e...
continuumsecurity.net
Irius Risk - threat modeling tool
https://www.continuumsecurity.net/threat-modeling-tool
IriusRisk - Threat Modeling Tool. IriusRisk is a single integrated console to manage application security risk throughout the software development process. Create a threat model and derive security requirements in minutes using a straightforward questionnaire based system. Integrated application risk analysis and architectural security for developers using a straight-forward questionnaire based approach. Manage risks at portfolio scale across the enterprise or per business unit. Get started with threat m...
continuumsecurity.net
BDD Security - Open Source automated security testing framework
https://www.continuumsecurity.net/bdd-security
BDD-Security - Security testing framework. Raquo; BDD security. BDD-Security is a security testing framework. That uses natural language in a Given, When, Then Gherkin syntax to describe security requirements as features. Those same requirements are also executable as standard unit/integration tests which means they can run as part of the build/test/deploy process. Free and Open Source automated testing framework for security. Upgrade DevOps to SecDevOps. The tests can launch automated scans:. The framew...
continuumsecurity.net
Web Application Security Checklists as Code - Continuum Security
https://www.continuumsecurity.net/web-application-security-checklists-code
Web Application Security Checklists as Code. Raquo; Web Application Security Checklists as Code. Web Application Security Checklists as Code. Imagine ACME Web Development Company performs several tens, hundreds or even thousands of Web Application deployments a year and it has a typically small Application Security Team compared to the development and QA teams. How does ACME ensure that those applications have included a reasonable set of security countermeasures? Or its own internal version. 2- Add auto...
continuumsecurity.net
Upgrade your DevOps to SecDevOps at RootedCon - Continuum Security
https://www.continuumsecurity.net/upgrade-your-devops-to-secdevops-at-rootedcon
Upgrade your DevOps to SecDevOps at RootedCon. Raquo; Upgrade your DevOps to SecDevOps at RootedCon. Upgrade your DevOps to SecDevOps at RootedCon. By Stephen de Vries. Join our CTO Paul Santapau at RootedCon in Madrid. Where he’ll be presenting a talk on implementing security in DevOps cultures. The aim of this talk is to demonstrate how we can embed security practices into modern DevOps software development environments. Did you like this article? Check out our security tools:. YOU MAY ALSO LIKE. The p...
continuumsecurity.net
About Us - meet the Continuum Security team
https://www.continuumsecurity.net/about-us
Raquo; About Us. We are dedicated to building the tools you need to manage and test the security of your software. Security tools and processes have to be business enablers, not blockers; and they cannot slow down the speed of development. Our solutions integrate with the normal development workflow, so that security is truly built in and not bolted on. Stephen enjoys tinkering with renewable, off-grid energy systems and writing code. Rafael Topera is a code guru in Groovy, Java and JavaScript. When ...
continuumsecurity.net
November 2016 - Continuum Security
https://www.continuumsecurity.net/2016/11
Monthly Archive for: November, 2016. Raquo; Archives for November 2016. Launching IriusRisk ‘Community Edition’. The scalable Threat Modeling and Risk Management solution for product development is now free to use. Developers, architects and technical teams, this is a call for you to contribute to building [.]. Security workflows for DevOps teams with IriusRisk. Web Application Security Checklists as Code. Upgrade your DevOps to SecDevOps at RootedCon. Launching IriusRisk ‘Community Edition’.
continuumsecurity.net
Blog - Software and application security management related articles
https://www.continuumsecurity.net/blog
Security workflows for DevOps teams with IriusRisk. Threat Modeling and defining security requirements is just step one on the journey to building a secure system. The threat model should really inform all downstream security activities, including [.]. Web Application Security Checklists as Code. The problem Imagine ACME Web Development Company performs several tens, hundreds or even thousands of Web Application deployments a year and it has a typically small Application Security Team [.]. Buscamos un de...
continuumsecurity.net
February 2017 - Continuum Security
https://www.continuumsecurity.net/2017/02
Monthly Archive for: February, 2017. Raquo; Archives for February 2017. Web Application Security Checklists as Code. The problem Imagine ACME Web Development Company performs several tens, hundreds or even thousands of Web Application deployments a year and it has a typically small Application Security Team [.]. Security workflows for DevOps teams with IriusRisk. Web Application Security Checklists as Code. Upgrade your DevOps to SecDevOps at RootedCon. Launching IriusRisk ‘Community Edition’.