[SC-L] Silver Bullet 108: Katie Moussouris
hi sc-l, Just in time for my Spring Break college tour with Eli, here is Silver Bullet episode 108, an interview with HackerOne’s Katie Moussouris. Katie and I talk about bug bounties, early coding (sadly she was a C64 person instead of an Apple ][+ person), SDL, BlueHat, mentors, and more. Have a listen http://bit.ly/SB-katie And as always, please pass it on through all media (twitter, facebook, linkedin, email, and good old fashioned word of mouth). Your feedback is welcome. gem company www.cigital.com blog www.cigital.com/justiceleague book www.swsec.com twitter @cigitalgem ___ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates ___
[SC-L] [searchsecurity] How to structure an SSG
hi sc-l, During the last BSIMM Conference in Monterey, CA, Caroline Wong ran a workshop/session during which all 23 firms present shared their BSIMM structures with eachother. The event was organized as a poster session. It was a great event. Caroline and I took the data, crunched it, organized it, and wrote it up in an article that was just published by SearchSecurity. http://bit.ly/gem-SSG If you’re wondering how to structure a new SSG, or refactor an existing SSG, take a look at what we discovered. As always, your feedback is welcome. Tweet to be about it @cigitalgem. gem company www.cigital.com podcast www.cigital.com/silverbullet blog www.cigital.com/justiceleague book www.swsec.com twitter @cigitalgem ___ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates ___