Sean Glencross (@appsecseanner) 's Twitter Profile
Sean Glencross

@appsecseanner

hack the planet!

ID: 1186811201126166528

calendar_today23-10-2019 01:07:30

674 Tweet

113 Takipçi

238 Takip Edilen

Tanya Janca (@shehackspurple) 's Twitter Profile Photo

Thread 🧵about yelling In my early twenties I had a boss that yelled and screamed at people. I was new, but had heard it happen to others. One day I reported a design flaw to him, for a new app we were about to build. He started to get upset, like he was going to yell.

Tanya Janca (@shehackspurple) 's Twitter Profile Photo

🔥 Get ready for an interactive session on Semgrep rule writing! On September 16th at 9AM PT, Brandon Wu and I will help you create and refine your own rules. Don’t miss it—sign up now! ow.ly/RyJB50T1kHN

🔥 Get ready for an interactive session on Semgrep rule writing! On September 16th at 9AM PT, Brandon Wu and I will help you create and refine your own rules. Don’t miss it—sign up now! 

ow.ly/RyJB50T1kHN
Threat Modeling Connect (@tmconnecthq) 's Twitter Profile Photo

🚀 Discover how Laurent Bouchard and Léandre Forget Besnard changed the conversations about security at @Desjardins through #ThreatModeling. Don't miss out on their insights at #ThreatModCon 2024 San Francisco next month! Register: hubs.li/Q02LMw1b0

🚀 Discover how Laurent Bouchard and Léandre Forget Besnard changed the conversations about security at @Desjardins through #ThreatModeling. Don't miss out on their insights at #ThreatModCon 2024 San Francisco next month! Register: hubs.li/Q02LMw1b0
Semgrep (@semgrep) 's Twitter Profile Photo

🚨 CONTEST ALERT! 🚨 Want to win 1 of 3 decks of 'Cards Against AppSec' by Tanya Janca? Simply RT this post and make sure you're following us to enter! ⏳ You have 48 hours—good luck! #AppSec #Giveaway #CardsAgainstAppSec

🚨 CONTEST ALERT! 🚨

Want to win 1 of 3 decks of 'Cards Against AppSec' by Tanya Janca? Simply RT this post and make sure you're following us to enter! ⏳ You have 48 hours—good luck!

#AppSec #Giveaway #CardsAgainstAppSec
Semgrep (@semgrep) 's Twitter Profile Photo

Our previous post got deleted; we are sorry to everyone who has already re-tweeted. Please re-tweet again. For everyone who followed us, we have your names listed and you will still be entered! Thank you for understanding.

Threat Modeling Connect (@tmconnecthq) 's Twitter Profile Photo

Get ready for an unexpected keynote at #ThreatModCon 2024 San Francisco! 💥 Join Caroline Wong, Matthew Coles, Izar Tarandach 🎗️, adam shostack, Zoe Braiterman, and a special guest as they tackle the hottest threat modeling topics LIVE! 👉 Get your ticket now: hubs.li/Q02MP89G0

Get ready for an unexpected keynote at #ThreatModCon 2024 San Francisco! 💥 Join Caroline Wong, Matthew Coles, <a href="/izar_t/">Izar Tarandach 🎗️</a>, <a href="/adamshostack/">adam shostack</a>, Zoe Braiterman, and a special guest as they tackle the hottest threat modeling topics LIVE! 👉 Get your ticket now: hubs.li/Q02MP89G0
Ian Coldwater 📦💥 (@iancoldwater) 's Twitter Profile Photo

I can either use my energy to stay still on camera or I can use my energy to pay attention to the meeting. One or the other, I can’t do both

Chey Curtis (@cheyenne_curtis) 's Twitter Profile Photo

🚨Heads up, LinkedIn just opted everyone into training their AI. Go to Settings->Data Privacy->TURN OFF data for generative AI improvement 🚨

🚨Heads up, LinkedIn just opted everyone into training their AI. 

Go to Settings-&gt;Data Privacy-&gt;TURN OFF data for generative AI improvement 🚨
Jonathan Marcil (@jonathanmarcil) 's Twitter Profile Photo

I'll be speaking as part of the un-keynote at #ThreatModCon 2024 in San Francisco next weekend. Will also moderate a session during lunch time. It's a one day focused event on Threat Modeling, check it out if you're into or curious about it! threatmodcon.com/san-francisco

Tanya Janca (@shehackspurple) 's Twitter Profile Photo

Developers, if you're doing secure coding training, is it helpful to have first a "this is crappy code", then "this is better code" then "This is the best code" types of examples and walk throughs? Like "here's how we could call a secret management tool, and why" Thoughts?

Tanya Janca (@shehackspurple) 's Twitter Profile Photo

Also, would you rather write all the code yourself? Or walk through? Or review code? Or walk through then you code? Or, what do you like the best and how do you learn the best? Thank you for your input. I may or may not be working on my next workshop. 😉

Threat Modeling Connect (@tmconnecthq) 's Twitter Profile Photo

We’ve just launched our new community forum! 🎉 A dedicated space for our members to share challenges, explore best practices, and get input from one another about all things #ThreatModeling. 👉 Join the discussions now: hubs.li/Q02VcD5v0