Backslash Security (@backslashsec) 's Twitter Profile
Backslash Security

@backslashsec

The first Cloud-Native #ApplicationSecurity solution for enterprise #AppSec teams to provide unified security and business context to cloud-native code risk.

ID: 1633728181839581191

linkhttp://backslash.security calendar_today09-03-2023 07:15:40

341 Tweet

93 Takipçi

36 Takip Edilen

Backslash Security (@backslashsec) 's Twitter Profile Photo

👀 Interesting read from Backslash Security's CTO, Yossi Pik, on the hidden risks of trusting AI-generated code. 👉 Check out the full article: techradar.com/pro/the-illusi… #AI #AppSec #CodeSecurity

Backslash Security (@backslashsec) 's Twitter Profile Photo

🚨 Why Does Software Composition Analysis (SCA) Suck? 🚨 Using real examples, James Berthoty shows the tricky side of fixing vulnerabilities and highlights how reachability analysis (with a little help from Backslash!) can cut out the unnecessary work. 👉youtube.com/watch?v=chma4_…

Backslash Security (@backslashsec) 's Twitter Profile Photo

📅 𝘖𝘯𝘭𝘺 1 𝘸𝘦𝘦𝘬 𝘵𝘰 𝘨𝘰! 📅 Don't miss this 30-minute session, where we'll get straight to the heart of today's hottest topics in AppSec! Join James Berthoty, Founder of Latio Tech, and Shahar Man, CEO of Backslash Security. Register here: us06web.zoom.us/webinar/regist…

📅 𝘖𝘯𝘭𝘺 1 𝘸𝘦𝘦𝘬 𝘵𝘰 𝘨𝘰! 📅

Don't miss this 30-minute session, where we'll get straight to the heart of today's hottest topics in AppSec! Join James Berthoty, Founder of Latio Tech, and Shahar Man, CEO of Backslash Security.
Register here: us06web.zoom.us/webinar/regist…
Backslash Security (@backslashsec) 's Twitter Profile Photo

🏆🏆🏆 Backslash Security just won Most Innovative Application Security Solution at the 2024 InfoSec Innovator Awards by CyberDefenseMagazine ! We’re redefining AppSec from the ground up—not just “next-gen” but a truly fresh approach. See it in action: backslash.security/demo

🏆🏆🏆 Backslash Security just won Most Innovative Application Security Solution at the 2024 InfoSec Innovator Awards by <a href="/cyberdefensemag/">CyberDefenseMagazine</a> !
We’re redefining AppSec from the ground up—not just “next-gen” but a truly fresh approach.
See it in action: backslash.security/demo
Backslash Security (@backslashsec) 's Twitter Profile Photo

📖 Check out our new blog! 𝗨𝗻𝘁𝗮𝗻𝗴𝗹𝗶𝗻𝗴 𝘁𝗵𝗲 𝗔𝗽𝗽𝗦𝗲𝗰 𝗠𝗲𝘀𝘀: 𝗛𝗼𝘄 𝘁𝗼 𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗬𝗼𝘂𝗿 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀. 👉backslash.security/blog/appsec

📖 Check out our new blog!
𝗨𝗻𝘁𝗮𝗻𝗴𝗹𝗶𝗻𝗴 𝘁𝗵𝗲 𝗔𝗽𝗽𝗦𝗲𝗰 𝗠𝗲𝘀𝘀: 𝗛𝗼𝘄 𝘁𝗼 𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗬𝗼𝘂𝗿 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀.

👉backslash.security/blog/appsec
Backslash Security (@backslashsec) 's Twitter Profile Photo

🚀 𝗛𝗼𝘁 𝗼𝗳𝗳 𝘁𝗵𝗲 𝗽𝗿𝗲𝘀𝘀! 𝗧𝗵𝗲 𝗔𝗽𝗽𝗦𝗲𝗰 & 𝗥&𝗗 𝗣𝗹𝗮𝘆𝗯𝗼𝗼𝗸 🚀Let’s be real—AppSec and R&D can sometimes feel like they’re playing two different games: one’s on defense, the other’s all offense. This eBook is your game plan: backslash.security/appsec-rd-play…

🚀 𝗛𝗼𝘁 𝗼𝗳𝗳 𝘁𝗵𝗲 𝗽𝗿𝗲𝘀𝘀! 𝗧𝗵𝗲 𝗔𝗽𝗽𝗦𝗲𝗰 &amp; 𝗥&amp;𝗗 𝗣𝗹𝗮𝘆𝗯𝗼𝗼𝗸 🚀Let’s be real—AppSec and R&amp;D can sometimes feel like they’re playing two different games: one’s on defense, the other’s all offense. This eBook is your game plan: backslash.security/appsec-rd-play…
Backslash Security (@backslashsec) 's Twitter Profile Photo

Shahar Man, Backslash CEO, shares with The Hacker News his take on breathing fresh life into stagnant AppSec initiatives. Check it out here: thehackernews.com/expert-insight…

Backslash Security (@backslashsec) 's Twitter Profile Photo

🚀 Simplify Your FedRAMP & FISMA Compliance Journey! Tackling the strict security requirements, lengthy timelines, and resource-heavy processes of FedRAMP and FISMA is overwhelming. We are here to help! 👉backslash.security/fedramp #FedRAMP #FISMA #AppSec

🚀 Simplify Your FedRAMP &amp; FISMA Compliance Journey!
Tackling the strict security requirements, lengthy timelines, and resource-heavy processes of FedRAMP and FISMA is overwhelming.
We are here to help!  👉backslash.security/fedramp

#FedRAMP #FISMA #AppSec
Backslash Security (@backslashsec) 's Twitter Profile Photo

🛠️Backslash provides comprehensive PR comments on GitHub, listing every finding that violates your policies. All policy violations are clearly outlined within the PR, making them easy to review and address without leaving GitHub. ✅ See it in action: backslash.security/demo

🛠️Backslash provides comprehensive PR comments on GitHub, listing every finding that violates your policies. 
All policy violations are clearly outlined within the PR, making them easy to review and address without leaving GitHub. ✅
See it in action: backslash.security/demo
Backslash Security (@backslashsec) 's Twitter Profile Photo

The AppSec & R&D Playbook is designed to empower security and development leaders with proven, actionable steps to: ✅ Build efficient workflows ✅ Strengthen security without slowing down innovation ✅ Foster collaboration 📩 Download the playbook now : backslash.security/appsec-rd-play…

The AppSec &amp; R&amp;D Playbook is designed to empower security and development leaders with proven, actionable steps to:
✅ Build efficient workflows
✅ Strengthen security without slowing down innovation
✅ Foster collaboration 
📩 Download the playbook now : backslash.security/appsec-rd-play…
Backslash Security (@backslashsec) 's Twitter Profile Photo

😬 Struggling with #FedRAMP and #FISMA compliance? We get it! Navigating rigorous security requirements, key controls, and meeting strict timelines can be overwhelming. See how Backslash aligns with key controls and helps streamline compliance efforts: backslash.security/fedramp

😬 Struggling with #FedRAMP and #FISMA compliance? We get it! 
Navigating rigorous security requirements, key controls, and meeting strict timelines can be overwhelming.
See how Backslash aligns with key controls and helps streamline compliance efforts: backslash.security/fedramp
Backslash Security (@backslashsec) 's Twitter Profile Photo

Catch Shahar Man and James Berthoty in this about: ✅ The differences between ASPM and Code Security ✅ How CNAPP vendors are stepping into the AppSec arena ✅ Debunking myths about shift-left strategies 👉Watch it now: youtube.com/watch?v=1k10mW…

Backslash Security (@backslashsec) 's Twitter Profile Photo

📖 The AppSec & R&D Playbook: Aligning Security and Innovation ✅ Overcome common barriers between AppSec and R&D ✅ Manage Risk in Security and R&D Collaboration ✅ Build a sustainable, collaborative model Get it now: backslash.security/appsec-rd-play…

Backslash Security (@backslashsec) 's Twitter Profile Photo

🖖 𝗦𝘁𝗮𝗿 𝗧𝗿𝗲𝗸 𝗳𝗮𝗻𝘀, 𝘆𝗼𝘂 𝗸𝗻𝗼𝘄 𝘁𝗵𝗲 𝗺𝗼𝗺𝗲𝗻𝘁. For too long, AppSec has been stuck in 2D scanning, unable to truly see the full picture. It’s time to rethink AppSec: backslash.security

Backslash Security (@backslashsec) 's Twitter Profile Photo

𝗚𝗼 𝗯𝗲𝘆𝗼𝗻𝗱 𝗯𝗮𝘀𝗶𝗰 𝗦𝗖𝗔 𝗮𝗻𝗱 𝗦𝗔𝗦𝗧! With advanced reachability analysis, phantom package detection, and powerful remediation capabilities. See it in action: backslash.security/demo

𝗚𝗼 𝗯𝗲𝘆𝗼𝗻𝗱 𝗯𝗮𝘀𝗶𝗰 𝗦𝗖𝗔 𝗮𝗻𝗱 𝗦𝗔𝗦𝗧!

With advanced reachability analysis, phantom package detection, and powerful remediation capabilities. See it in action: backslash.security/demo
Backslash Security (@backslashsec) 's Twitter Profile Photo

🤔 𝗜𝘀 𝗣𝗥 𝗦𝗰𝗮𝗻𝗻𝗶𝗻𝗴 𝗘𝗻𝗼𝘂𝗴𝗵? New research from our team reveals a major security gap: PR gates often catch very little, and most OSS vulnerabilities are discovered long after code is merged. Read the research: backslash.security/blog/is-pr-sca…

🤔 𝗜𝘀 𝗣𝗥 𝗦𝗰𝗮𝗻𝗻𝗶𝗻𝗴 𝗘𝗻𝗼𝘂𝗴𝗵?
New research from our team reveals a major security gap: PR gates often catch very little, and most OSS vulnerabilities are discovered long after code is merged. 
Read the research: backslash.security/blog/is-pr-sca…
Backslash Security (@backslashsec) 's Twitter Profile Photo

🤯 𝗢𝗻 𝗮𝘃𝗲𝗿𝗮𝗴𝗲, 𝗶𝘁 𝘁𝗮𝗸𝗲𝘀 𝗷𝘂𝘀𝘁 𝗼𝗻𝗲 𝘆𝗲𝗮𝗿 𝗳𝗼𝗿 𝗮 𝗽𝗮𝗰𝗸𝗮𝗴𝗲 𝘁𝗼 𝗯𝗲𝗰𝗼𝗺𝗲 𝘃𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲. While PR scanning is a crucial part of application security, it’s not enough. Read our full findings here: backslash.security/blog/is-pr-sca…

🤯 𝗢𝗻 𝗮𝘃𝗲𝗿𝗮𝗴𝗲, 𝗶𝘁 𝘁𝗮𝗸𝗲𝘀 𝗷𝘂𝘀𝘁 𝗼𝗻𝗲 𝘆𝗲𝗮𝗿 𝗳𝗼𝗿 𝗮 𝗽𝗮𝗰𝗸𝗮𝗴𝗲 𝘁𝗼 𝗯𝗲𝗰𝗼𝗺𝗲 𝘃𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲.
While PR scanning is a crucial part of application security, it’s not enough. Read our full findings here: backslash.security/blog/is-pr-sca…
Backslash Security (@backslashsec) 's Twitter Profile Photo

PR gates are great for verifying code changes, but let’s be real—they’re not a true defense mechanism. In our latest research, we conducted an extensive analysis of popular npm packages with over 1,000,000 yearly downloads. 📖 Check out our findings: backslash.security/blog/is-pr-sca…

PR gates are great for verifying code changes, but let’s be real—they’re not a true defense mechanism. In our latest research, we conducted an extensive analysis of popular npm packages with over 1,000,000 yearly downloads.

📖 Check out our findings: backslash.security/blog/is-pr-sca…
Backslash Security (@backslashsec) 's Twitter Profile Photo

𝗙𝗿𝗲𝘀𝗵 𝗔𝗽𝗽𝗦𝗲𝗰 𝗶𝗱𝗲𝗮𝘀, 𝗮𝗻𝘆𝗼𝗻𝗲? Our CEO’s, Shahar Man latest The Hacker News article explores how to revitalize application security practices for today’s challenges. Dive in: thehackernews.com/expert-insight…

Backslash Security (@backslashsec) 's Twitter Profile Photo

𝗧𝗵𝗲 𝗔𝗽𝗽𝗦𝗲𝗰 & 𝗥&𝗗 𝗣𝗹𝗮𝘆𝗯𝗼𝗼𝗸: 𝗛𝗼𝘄 𝘁𝗼 𝗔𝗹𝗶𝗴𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗜𝗻𝗻𝗼𝘃𝗮𝘁𝗶𝗼𝗻 Bridge the gap between AppSec and R&D with clear steps to streamline workflows and foster collaboration. 👉 backslash.security/appsec-rd-play…