Ted James, SQL Agent Man (@deepeddyinfosec) 's Twitter Profile
Ted James, SQL Agent Man

@deepeddyinfosec

Application Security Engineer, script adult, learner of things, drinker of pints, reader of books, player of guitars. @hacknotcrime Advocate!

ID: 716083679726931969

linkhttps://deepeddyinfosec.github.io calendar_today02-04-2016 02:03:48

10,10K Tweet

5,5K Takipçi

3,3K Takip Edilen

Ted James, SQL Agent Man (@deepeddyinfosec) 's Twitter Profile Photo

I remember being asked to attend a software planning meeting as the security SME. I occupied more than 50% of the meeting with security-related questions. I wasn't invited back to the next meeting.

DC | David Lee (@dccybersec) 's Twitter Profile Photo

Are you interested in cybersecurity and want to talk (for free) with an industry professional? Let's have a chat! outlook.office.com/book/TSIPDisco…

Ted James, SQL Agent Man (@deepeddyinfosec) 's Twitter Profile Photo

When you license art for your project and it says "AI Generated," are you really required to give the "artist" credit? All they did was tell AI to create an image that looks like "this." Are you really an artist if software creates it for you?

Ted James, SQL Agent Man (@deepeddyinfosec) 's Twitter Profile Photo

Should accessibility be built into an application/website the way security is supposed to be or should it be left to someone else to implement during the SDLC? Is it the developer's job?

zSecurity (@_zsecurity_) 's Twitter Profile Photo

🎉 GIVEAWAY TIME! 🎉 Win access to our OSINT Course & Certification Exam (worth $349). Perfect for anyone looking to break into, or level up their OSINT career! Includes: 📘 Learn OSINT from Scratch course 🎓 C|OSINT|P Exam & Certification - zsecurity.org/cosintp How to

🎉 GIVEAWAY TIME! 🎉
Win access to our OSINT Course & Certification Exam (worth $349).
Perfect for anyone looking to break into, or level up their OSINT career!

Includes:
📘 Learn OSINT from Scratch course
🎓 C|OSINT|P Exam & Certification - zsecurity.org/cosintp

How to
Tanya Janca | Shehackspurple (@shehackspurple) 's Twitter Profile Photo

I have created a free, downloadable, secure coding guideline (22 pages), from my new book, Alice and Bob Learn Secure Coding. You can download it, and sign up for my newsletter, at the link below. Feel free to adopt it at work! twp.ai/ImmX3Y

I have created a free, downloadable, secure coding guideline (22 pages), from my new book, Alice and Bob Learn Secure Coding. You can download it, and sign up for my newsletter, at the link below. Feel free to adopt it at work! 
twp.ai/ImmX3Y
Ted James, SQL Agent Man (@deepeddyinfosec) 's Twitter Profile Photo

You have a system that's will be replaced in a year. Should you continue to update it and conduct periodic security testing until you're ready to retire it or should you just let it go? I know my feelings. Anything could happen within that year. Is there a best practice for this?