12 Steps to Secure Software
Empower cybersecurity in software development projects with these easy and effective first steps.
As a speaker with international conference experience (Black Hat Arsenal USA, DEF CON AppSec Village USA, RSA Conference USA, Oracle JavaOne, Black Hat Arsenal Europe, Black Hat Arsenal Asia, DeepSec, BruCON, OWASP AppSecEU, OWASP AppSec Days, DevOpsCon Berlin/Munich/London/Singapore, JAX, Heise DevSec, Heise Sec-IT, Heise Herbstcampus, RuhrSec, JCon, JavaLand, Internet Security Days, IT-Tage Frankfurt, OOP, and others) I’m definitely enjoying to speak and train about IT-Security topics.
Attacking web applications, backends, APIs, and mobile apps in order to find vulnerabilities before others do.
Read MoreChecking the security and hardening of your cloud infrastructure and services against best-practices.
Read MoreSecurity review of your container orchestration platform (Kubernetes) as part of a defense-in-depth approach.
Read MoreEmpower cybersecurity in software development projects with these easy and effective first steps.
I was interviewed about improving cyber resilience through Micro Attack Simulations.
Summarizing the current state of advice regarding the Log4j vulnerability.