Backslash Security

341 posts

Backslash Security banner
Backslash Security

Backslash Security

@BackslashSec

The first Cloud-Native #ApplicationSecurity solution for enterprise #AppSec teams to provide unified security and business context to cloud-native code risk.

Tel Aviv, Israel Sumali Mart 2023
36 Sinusundan136 Mga Tagasunod
Backslash Security
Backslash Security@BackslashSecยท
๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ & ๐—ฅ&๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—”๐—น๐—ถ๐—ด๐—ป ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ป๐—ผ๐˜ƒ๐—ฎ๐˜๐—ถ๐—ผ๐—ป Bridge the gap between AppSec and R&D with clear steps to streamline workflows and foster collaboration. ๐Ÿ‘‰ backslash.security/appsec-rd-playโ€ฆ
English
0
0
0
129
Backslash Security
Backslash Security@BackslashSecยท
๐—™๐—ฟ๐—ฒ๐˜€๐—ต ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐—ถ๐—ฑ๐—ฒ๐—ฎ๐˜€, ๐—ฎ๐—ป๐˜†๐—ผ๐—ป๐—ฒ? Our CEOโ€™s, Shahar Man latest @TheHackersNews article explores how to revitalize application security practices for todayโ€™s challenges. Dive in: thehackernews.com/expert-insightโ€ฆ
English
0
0
0
86
Backslash Security
Backslash Security@BackslashSecยท
PR gates are great for verifying code changes, but letโ€™s be realโ€”theyโ€™re not a true defense mechanism. In our latest research, we conducted an extensive analysis of popular npm packages with over 1,000,000 yearly downloads. ๐Ÿ“– Check out our findings: backslash.security/blog/is-pr-scaโ€ฆ
Backslash Security tweet media
English
0
0
0
49
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿคฏ ๐—ข๐—ป ๐—ฎ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—ด๐—ฒ, ๐—ถ๐˜ ๐˜๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—ท๐˜‚๐˜€๐˜ ๐—ผ๐—ป๐—ฒ ๐˜†๐—ฒ๐—ฎ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ฎ ๐—ฝ๐—ฎ๐—ฐ๐—ธ๐—ฎ๐—ด๐—ฒ ๐˜๐—ผ ๐—ฏ๐—ฒ๐—ฐ๐—ผ๐—บ๐—ฒ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ. While PR scanning is a crucial part of application security, itโ€™s not enough. Read our full findings here: backslash.security/blog/is-pr-scaโ€ฆ
Backslash Security tweet media
English
0
0
0
33
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿค” ๐—œ๐˜€ ๐—ฃ๐—ฅ ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—˜๐—ป๐—ผ๐˜‚๐—ด๐—ต? New research from our team reveals a major security gap: PR gates often catch very little, and most OSS vulnerabilities are discovered long after code is merged. Read the research: backslash.security/blog/is-pr-scaโ€ฆ
Backslash Security tweet media
English
0
0
0
32
Backslash Security
Backslash Security@BackslashSecยท
๐—š๐—ผ ๐—ฏ๐—ฒ๐˜†๐—ผ๐—ป๐—ฑ ๐—ฏ๐—ฎ๐˜€๐—ถ๐—ฐ ๐—ฆ๐—–๐—” ๐—ฎ๐—ป๐—ฑ ๐—ฆ๐—”๐—ฆ๐—ง! With advanced reachability analysis, phantom package detection, and powerful remediation capabilities. See it in action: backslash.security/demo
Backslash Security tweet media
English
0
0
0
21
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ–– ๐—ฆ๐˜๐—ฎ๐—ฟ ๐—ง๐—ฟ๐—ฒ๐—ธ ๐—ณ๐—ฎ๐—ป๐˜€, ๐˜†๐—ผ๐˜‚ ๐—ธ๐—ป๐—ผ๐˜„ ๐˜๐—ต๐—ฒ ๐—บ๐—ผ๐—บ๐—ฒ๐—ป๐˜. For too long, AppSec has been stuck in 2D scanning, unable to truly see the full picture. Itโ€™s time to rethink AppSec: backslash.security
GIF
English
0
0
0
31
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ“– The AppSec & R&D Playbook: Aligning Security and Innovation โœ… Overcome common barriers between AppSec and R&D โœ… Manage Risk in Security and R&D Collaboration โœ… Build a sustainable, collaborative model Get it now: backslash.security/appsec-rd-playโ€ฆ
English
0
0
0
21
Backslash Security
Backslash Security@BackslashSecยท
Catch Shahar Man and James Berthoty in this about: โœ… The differences between ASPM and Code Security โœ… How CNAPP vendors are stepping into the AppSec arena โœ… Debunking myths about shift-left strategies ๐Ÿ‘‰Watch it now: youtube.com/watch?v=1k10mWโ€ฆ
YouTube video
YouTube
English
0
0
0
35
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ˜ฌ Struggling with #FedRAMP and #FISMA compliance? We get it! Navigating rigorous security requirements, key controls, and meeting strict timelines can be overwhelming. See how Backslash aligns with key controls and helps streamline compliance efforts: backslash.security/fedramp
Backslash Security tweet media
English
0
0
0
25
Backslash Security
Backslash Security@BackslashSecยท
The AppSec & R&D Playbook is designed to empower security and development leaders with proven, actionable steps to: โœ… Build efficient workflows โœ… Strengthen security without slowing down innovation โœ… Foster collaboration ๐Ÿ“ฉ Download the playbook now : backslash.security/appsec-rd-playโ€ฆ
Backslash Security tweet media
English
0
0
0
27
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ› ๏ธBackslash provides comprehensive PR comments on GitHub, listing every finding that violates your policies. All policy violations are clearly outlined within the PR, making them easy to review and address without leaving GitHub. โœ… See it in action: backslash.security/demo
Backslash Security tweet mediaBackslash Security tweet media
English
0
0
0
30
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿš€ Simplify Your FedRAMP & FISMA Compliance Journey! Tackling the strict security requirements, lengthy timelines, and resource-heavy processes of FedRAMP and FISMA is overwhelming. We are here to help! ๐Ÿ‘‰backslash.security/fedramp #FedRAMP #FISMA #AppSec
Backslash Security tweet media
English
0
0
0
15
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿš€ ๐—›๐—ผ๐˜ ๐—ผ๐—ณ๐—ณ ๐˜๐—ต๐—ฒ ๐—ฝ๐—ฟ๐—ฒ๐˜€๐˜€! ๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ & ๐—ฅ&๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ ๐Ÿš€Letโ€™s be realโ€”AppSec and R&D can sometimes feel like theyโ€™re playing two different games: oneโ€™s on defense, the otherโ€™s all offense. This eBook is your game plan: backslash.security/appsec-rd-playโ€ฆ
Backslash Security tweet media
English
0
0
0
8
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ“– Check out our new blog! ๐—จ๐—ป๐˜๐—ฎ๐—ป๐—ด๐—น๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐— ๐—ฒ๐˜€๐˜€: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€. ๐Ÿ‘‰backslash.security/blog/appsec
Backslash Security tweet media
English
0
0
0
8
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ†๐Ÿ†๐Ÿ† Backslash Security just won Most Innovative Application Security Solution at the 2024 InfoSec Innovator Awards by @cyberdefensemag ! Weโ€™re redefining AppSec from the ground upโ€”not just โ€œnext-genโ€ but a truly fresh approach. See it in action: backslash.security/demo
Backslash Security tweet media
English
0
0
0
14
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿ“… ๐˜–๐˜ฏ๐˜ญ๐˜บ 1 ๐˜ธ๐˜ฆ๐˜ฆ๐˜ฌ ๐˜ต๐˜ฐ ๐˜จ๐˜ฐ! ๐Ÿ“… Don't miss this 30-minute session, where we'll get straight to the heart of today's hottest topics in AppSec! Join James Berthoty, Founder of Latio Tech, and Shahar Man, CEO of Backslash Security. Register here: us06web.zoom.us/webinar/registโ€ฆ
Backslash Security tweet media
English
0
0
0
23
Backslash Security
Backslash Security@BackslashSecยท
๐Ÿšจ Why Does Software Composition Analysis (SCA) Suck? ๐Ÿšจ Using real examples, James Berthoty shows the tricky side of fixing vulnerabilities and highlights how reachability analysis (with a little help from Backslash!) can cut out the unnecessary work. ๐Ÿ‘‰youtube.com/watch?v=chma4_โ€ฆ
YouTube video
YouTube
English
0
0
0
13