Understanding Access Control Models: RBAC, ABAC, and DAC

Understanding Access Control Models: RBAC, ABAC, and DAC

| | api, Product Security, security
Different models of access control offer unique methods and benefits. The three primary models are Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Discretionary Access Control (DAC) ...
Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)

Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)

Learn from our interview with Keshav how to better write your custom security tests and why they're necessary for your Product Security Program ...
The art and science of product security: A deep dive with Jacob Salassi

The art and science of product security: A deep dive with Jacob Salassi

Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...

Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers

The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Grammatech ...

Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers

The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Grammatech ...

Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers

The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on CodeSecure ...
Two Key New Features in CodeSonar

Two Key New Features in CodeSonar

CodeSonar 7.3 is available to all customers under current support and maintenance agreements and as always, GrammaTech highly recommends that users upgrade to the latest release. The release notes provide a great ...
Dynamic Linking Injection and LOLBAS Fun

Dynamic Linking Injection and LOLBAS Fun

Dynamic-Linking Injection and LOLBAS Fun Introduction LoadLibrary and LoadLibraryEx are how Windows applications load shared libraries at runtime. Praetorian recently tested a .NET web application that unsafely passed user input into LoadLibrary ...
SAST Tools Must Support Your Embedded Operating Systems, Toolchains & Compilers – Chose Wisely

SAST Tools Must Support Your Embedded Operating Systems, Toolchains & Compilers – Chose Wisely

Embedded software development is very close to the development platform used. Whether it’s bare metal development, commercial RTOS or embedded Linux, the tool chain is an important component in software development. It’s ...