Thursday, December 26, 2024

“You don’t want to be that person”: What security teams need to understand about developers

Programming Language“You don’t want to be that person”: What security teams need to understand about developers


The home team is joined by Kinnaird McQuaid, founder and CTO of NightVision, which offers developer-friendly API and web app security testing. Kinnaird talks about his path from school-age hacker to white-hat security expert, why it’s important to build security practices into the software development lifecycle, how GenAI is changing security testing, and what security teams need to understand about developers’ working lives.

Credit: Alexandra Francis

NightVision offers web and API security testing tools built to integrate with developers’ established workflows. NightVision identifies issues by precise area(s) of code, so devs don’t have to chase down and validate vulnerability reports, a process that eats up precious engineering resources. Get started with their docs.

Connect with Kinnaird on LinkedIn.

Stack Overflow user Cecil Curry earned a Populist badge with their exceptionally thoughtful answer to In Python how can one tell if a module comes from a C extension?.

Some great excerpts from this episode:

“From the program side, I would say if you’re running a security program or you’re starting from day one, there’s a danger with security people and being the security person who’s out of touch or doesn’t know what the life of a developer is like. And you don’t want to be that person. And that’s not how you have actual business impact, right? So you got to embed with teams, threat model, and then do some preventative security testing, right? Testing things before it gets into production, not just relying on having a bug bounty program.”

“With code scanning, you’re looking for potentially insecure patterns in the code, but with dynamic testing, you’re actually testing the live application. So we’re sending HTTP traffic to the application, sending malicious payloads in forms or in query parameters, et cetera, to try to elicit a response or to send something to an attacker controlled server. And so using this, we’re able to. Not just have theoretical vulnerabilities, but exploitable vulnerabilities. I mean, how many times have you looked at something in GitHub security alerts and thought, yeah, that’s not real. That’s not exploitable. Right. So we’re trying to avoid that and have higher quality touch points with developers. So when they look at something, they say, okay, that’s exploitable. You showed me how. And you traced it back to code.”

TRANSCRIPT

Check out our other content

Check out other tags:

Most Popular Articles