Backslash Security (@backslashsec) 's Twitter Profile
Backslash Security

@backslashsec

The first Cloud-Native #ApplicationSecurity solution for enterprise #AppSec teams to provide unified security and business context to cloud-native code risk.

ID: 1633728181839581191

linkhttp://backslash.security calendar_today09-03-2023 07:15:40

341 Tweet

93 Followers

36 Following

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ‘€ Interesting read from Backslash Security's CTO, Yossi Pik, on the hidden risks of trusting AI-generated code. ๐Ÿ‘‰ Check out the full article: techradar.com/pro/the-illusiโ€ฆ #AI #AppSec #CodeSecurity

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿšจ Why Does Software Composition Analysis (SCA) Suck? ๐Ÿšจ Using real examples, James Berthoty shows the tricky side of fixing vulnerabilities and highlights how reachability analysis (with a little help from Backslash!) can cut out the unnecessary work. ๐Ÿ‘‰youtube.com/watch?v=chma4_โ€ฆ

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ“… ๐˜–๐˜ฏ๐˜ญ๐˜บ 1 ๐˜ธ๐˜ฆ๐˜ฆ๐˜ฌ ๐˜ต๐˜ฐ ๐˜จ๐˜ฐ! ๐Ÿ“… Don't miss this 30-minute session, where we'll get straight to the heart of today's hottest topics in AppSec! Join James Berthoty, Founder of Latio Tech, and Shahar Man, CEO of Backslash Security. Register here: us06web.zoom.us/webinar/registโ€ฆ

๐Ÿ“… ๐˜–๐˜ฏ๐˜ญ๐˜บ 1 ๐˜ธ๐˜ฆ๐˜ฆ๐˜ฌ ๐˜ต๐˜ฐ ๐˜จ๐˜ฐ! ๐Ÿ“…

Don't miss this 30-minute session, where we'll get straight to the heart of today's hottest topics in AppSec! Join James Berthoty, Founder of Latio Tech, and Shahar Man, CEO of Backslash Security.
Register here: us06web.zoom.us/webinar/registโ€ฆ
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ†๐Ÿ†๐Ÿ† Backslash Security just won Most Innovative Application Security Solution at the 2024 InfoSec Innovator Awards by CyberDefenseMagazine ! Weโ€™re redefining AppSec from the ground upโ€”not just โ€œnext-genโ€ but a truly fresh approach. See it in action: backslash.security/demo

๐Ÿ†๐Ÿ†๐Ÿ† Backslash Security just won Most Innovative Application Security Solution at the 2024 InfoSec Innovator Awards by <a href="/cyberdefensemag/">CyberDefenseMagazine</a> !
Weโ€™re redefining AppSec from the ground upโ€”not just โ€œnext-genโ€ but a truly fresh approach.
See it in action: backslash.security/demo
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ“– Check out our new blog! ๐—จ๐—ป๐˜๐—ฎ๐—ป๐—ด๐—น๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐— ๐—ฒ๐˜€๐˜€: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€. ๐Ÿ‘‰backslash.security/blog/appsec

๐Ÿ“– Check out our new blog!
๐—จ๐—ป๐˜๐—ฎ๐—ป๐—ด๐—น๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐— ๐—ฒ๐˜€๐˜€: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€.

๐Ÿ‘‰backslash.security/blog/appsec
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿš€ ๐—›๐—ผ๐˜ ๐—ผ๐—ณ๐—ณ ๐˜๐—ต๐—ฒ ๐—ฝ๐—ฟ๐—ฒ๐˜€๐˜€! ๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ & ๐—ฅ&๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ ๐Ÿš€Letโ€™s be realโ€”AppSec and R&D can sometimes feel like theyโ€™re playing two different games: oneโ€™s on defense, the otherโ€™s all offense. This eBook is your game plan: backslash.security/appsec-rd-playโ€ฆ

๐Ÿš€ ๐—›๐—ผ๐˜ ๐—ผ๐—ณ๐—ณ ๐˜๐—ต๐—ฒ ๐—ฝ๐—ฟ๐—ฒ๐˜€๐˜€! ๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ &amp; ๐—ฅ&amp;๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ ๐Ÿš€Letโ€™s be realโ€”AppSec and R&amp;D can sometimes feel like theyโ€™re playing two different games: oneโ€™s on defense, the otherโ€™s all offense. This eBook is your game plan: backslash.security/appsec-rd-playโ€ฆ
Backslash Security (@backslashsec) 's Twitter Profile Photo

Shahar Man, Backslash CEO, shares with The Hacker News his take on breathing fresh life into stagnant AppSec initiatives. Check it out here: thehackernews.com/expert-insightโ€ฆ

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿš€ Simplify Your FedRAMP & FISMA Compliance Journey! Tackling the strict security requirements, lengthy timelines, and resource-heavy processes of FedRAMP and FISMA is overwhelming. We are here to help! ๐Ÿ‘‰backslash.security/fedramp #FedRAMP #FISMA #AppSec

๐Ÿš€ Simplify Your FedRAMP &amp; FISMA Compliance Journey!
Tackling the strict security requirements, lengthy timelines, and resource-heavy processes of FedRAMP and FISMA is overwhelming.
We are here to help!  ๐Ÿ‘‰backslash.security/fedramp

#FedRAMP #FISMA #AppSec
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ› ๏ธBackslash provides comprehensive PR comments on GitHub, listing every finding that violates your policies. All policy violations are clearly outlined within the PR, making them easy to review and address without leaving GitHub. โœ… See it in action: backslash.security/demo

๐Ÿ› ๏ธBackslash provides comprehensive PR comments on GitHub, listing every finding that violates your policies. 
All policy violations are clearly outlined within the PR, making them easy to review and address without leaving GitHub. โœ…
See it in action: backslash.security/demo
Backslash Security (@backslashsec) 's Twitter Profile Photo

The AppSec & R&D Playbook is designed to empower security and development leaders with proven, actionable steps to: โœ… Build efficient workflows โœ… Strengthen security without slowing down innovation โœ… Foster collaboration ๐Ÿ“ฉ Download the playbook now : backslash.security/appsec-rd-playโ€ฆ

The AppSec &amp; R&amp;D Playbook is designed to empower security and development leaders with proven, actionable steps to:
โœ… Build efficient workflows
โœ… Strengthen security without slowing down innovation
โœ… Foster collaboration 
๐Ÿ“ฉ Download the playbook now : backslash.security/appsec-rd-playโ€ฆ
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ˜ฌ Struggling with #FedRAMP and #FISMA compliance? We get it! Navigating rigorous security requirements, key controls, and meeting strict timelines can be overwhelming. See how Backslash aligns with key controls and helps streamline compliance efforts: backslash.security/fedramp

๐Ÿ˜ฌ Struggling with #FedRAMP and #FISMA compliance? We get it! 
Navigating rigorous security requirements, key controls, and meeting strict timelines can be overwhelming.
See how Backslash aligns with key controls and helps streamline compliance efforts: backslash.security/fedramp
Backslash Security (@backslashsec) 's Twitter Profile Photo

Catch Shahar Man and James Berthoty in this about: โœ… The differences between ASPM and Code Security โœ… How CNAPP vendors are stepping into the AppSec arena โœ… Debunking myths about shift-left strategies ๐Ÿ‘‰Watch it now: youtube.com/watch?v=1k10mWโ€ฆ

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ“– The AppSec & R&D Playbook: Aligning Security and Innovation โœ… Overcome common barriers between AppSec and R&D โœ… Manage Risk in Security and R&D Collaboration โœ… Build a sustainable, collaborative model Get it now: backslash.security/appsec-rd-playโ€ฆ

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿ–– ๐—ฆ๐˜๐—ฎ๐—ฟ ๐—ง๐—ฟ๐—ฒ๐—ธ ๐—ณ๐—ฎ๐—ป๐˜€, ๐˜†๐—ผ๐˜‚ ๐—ธ๐—ป๐—ผ๐˜„ ๐˜๐—ต๐—ฒ ๐—บ๐—ผ๐—บ๐—ฒ๐—ป๐˜. For too long, AppSec has been stuck in 2D scanning, unable to truly see the full picture. Itโ€™s time to rethink AppSec: backslash.security

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐—š๐—ผ ๐—ฏ๐—ฒ๐˜†๐—ผ๐—ป๐—ฑ ๐—ฏ๐—ฎ๐˜€๐—ถ๐—ฐ ๐—ฆ๐—–๐—” ๐—ฎ๐—ป๐—ฑ ๐—ฆ๐—”๐—ฆ๐—ง! With advanced reachability analysis, phantom package detection, and powerful remediation capabilities. See it in action: backslash.security/demo

๐—š๐—ผ ๐—ฏ๐—ฒ๐˜†๐—ผ๐—ป๐—ฑ ๐—ฏ๐—ฎ๐˜€๐—ถ๐—ฐ ๐—ฆ๐—–๐—” ๐—ฎ๐—ป๐—ฑ ๐—ฆ๐—”๐—ฆ๐—ง!

With advanced reachability analysis, phantom package detection, and powerful remediation capabilities. See it in action: backslash.security/demo
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿค” ๐—œ๐˜€ ๐—ฃ๐—ฅ ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—˜๐—ป๐—ผ๐˜‚๐—ด๐—ต? New research from our team reveals a major security gap: PR gates often catch very little, and most OSS vulnerabilities are discovered long after code is merged. Read the research: backslash.security/blog/is-pr-scaโ€ฆ

๐Ÿค” ๐—œ๐˜€ ๐—ฃ๐—ฅ ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—˜๐—ป๐—ผ๐˜‚๐—ด๐—ต?
New research from our team reveals a major security gap: PR gates often catch very little, and most OSS vulnerabilities are discovered long after code is merged. 
Read the research: backslash.security/blog/is-pr-scaโ€ฆ
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐Ÿคฏ ๐—ข๐—ป ๐—ฎ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—ด๐—ฒ, ๐—ถ๐˜ ๐˜๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—ท๐˜‚๐˜€๐˜ ๐—ผ๐—ป๐—ฒ ๐˜†๐—ฒ๐—ฎ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ฎ ๐—ฝ๐—ฎ๐—ฐ๐—ธ๐—ฎ๐—ด๐—ฒ ๐˜๐—ผ ๐—ฏ๐—ฒ๐—ฐ๐—ผ๐—บ๐—ฒ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ. While PR scanning is a crucial part of application security, itโ€™s not enough. Read our full findings here: backslash.security/blog/is-pr-scaโ€ฆ

๐Ÿคฏ ๐—ข๐—ป ๐—ฎ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—ด๐—ฒ, ๐—ถ๐˜ ๐˜๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—ท๐˜‚๐˜€๐˜ ๐—ผ๐—ป๐—ฒ ๐˜†๐—ฒ๐—ฎ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ฎ ๐—ฝ๐—ฎ๐—ฐ๐—ธ๐—ฎ๐—ด๐—ฒ ๐˜๐—ผ ๐—ฏ๐—ฒ๐—ฐ๐—ผ๐—บ๐—ฒ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ.
While PR scanning is a crucial part of application security, itโ€™s not enough. Read our full findings here: backslash.security/blog/is-pr-scaโ€ฆ
Backslash Security (@backslashsec) 's Twitter Profile Photo

PR gates are great for verifying code changes, but letโ€™s be realโ€”theyโ€™re not a true defense mechanism. In our latest research, we conducted an extensive analysis of popular npm packages with over 1,000,000 yearly downloads. ๐Ÿ“– Check out our findings: backslash.security/blog/is-pr-scaโ€ฆ

PR gates are great for verifying code changes, but letโ€™s be realโ€”theyโ€™re not a true defense mechanism. In our latest research, we conducted an extensive analysis of popular npm packages with over 1,000,000 yearly downloads.

๐Ÿ“– Check out our findings: backslash.security/blog/is-pr-scaโ€ฆ
Backslash Security (@backslashsec) 's Twitter Profile Photo

๐—™๐—ฟ๐—ฒ๐˜€๐—ต ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ ๐—ถ๐—ฑ๐—ฒ๐—ฎ๐˜€, ๐—ฎ๐—ป๐˜†๐—ผ๐—ป๐—ฒ? Our CEOโ€™s, Shahar Man latest The Hacker News article explores how to revitalize application security practices for todayโ€™s challenges. Dive in: thehackernews.com/expert-insightโ€ฆ

Backslash Security (@backslashsec) 's Twitter Profile Photo

๐—ง๐—ต๐—ฒ ๐—”๐—ฝ๐—ฝ๐—ฆ๐—ฒ๐—ฐ & ๐—ฅ&๐—— ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ: ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—”๐—น๐—ถ๐—ด๐—ป ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ป๐—ผ๐˜ƒ๐—ฎ๐˜๐—ถ๐—ผ๐—ป Bridge the gap between AppSec and R&D with clear steps to streamline workflows and foster collaboration. ๐Ÿ‘‰ backslash.security/appsec-rd-playโ€ฆ