The Diamond in the Rough: Effective Vulnerability Management with OWASP DefectDojo

Managing the security of your projects applications can be an overwhelming and unmanageable task. In today’s world, the number of newly created frameworks and languages is continuing to increase and they each have their own security drawbacks associated with them.

The wide variety of security scanners available can help find vulnerabilities in your projects, but some scanners only work with certain languages and they each have different reporting output formats. Creating reports for customers or managers and viewing analytics using different security tools in different projects can be a very time-consuming task.

Continue reading “The Diamond in the Rough: Effective Vulnerability Management with OWASP DefectDojo”

Share

Building a Secure IoT Solution: Summit 2017

How do customers build an end-to-end IoT solution using commercial grade, open source products? This is the question we (Patrick Steiner, Maggie Hu and I) wanted to address with our session at the Red Hat Summit, Boston. The end-to-end solution is based on three-tier Enterprise IoT Architecture, which integrates IoT data with existing business processes and the human element.

Continue reading “Building a Secure IoT Solution: Summit 2017”

Share

Live Coding Reactive Systems w/Eclipse Vert.x and OpenShift

Do you know the battery level in your smartphone is controlled by reactive software; which is software that reacts to a set of external events, such as requests, failures, availability of services, etc? This was what I recently addressed as a slideless session consisting of pure, live coding at the Red Hat Summit this past May.

Continue reading “Live Coding Reactive Systems w/Eclipse Vert.x and OpenShift”

Share