Product Security

Understanding Access Control Models: RBAC, ABAC, and DAC
Different models of access control offer unique methods and benefits. The three primary models are Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Discretionary Access Control (DAC) ...

Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)
Learn from our interview with Keshav how to better write your custom security tests and why they're necessary for your Product Security Program ...

The art and science of product security: A deep dive with Jacob Salassi
Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...
Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers
The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Grammatech ...
Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers
The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Grammatech ...
Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers
The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on CodeSecure ...
Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian
Paul Asadoorian, OG security podcaster and host of the popular Paul’s Security Weekly podcast, joins us in this episode to talk about his career as one of the original security podcasters. Paul’s ...

Two Key New Features in CodeSonar
CodeSonar 7.3 is available to all customers under current support and maintenance agreements and as always, GrammaTech highly recommends that users upgrade to the latest release. The release notes provide a great ...

Dynamic Linking Injection and LOLBAS Fun
Dynamic-Linking Injection and LOLBAS Fun Introduction LoadLibrary and LoadLibraryEx are how Windows applications load shared libraries at runtime. Praetorian recently tested a .NET web application that unsafely passed user input into LoadLibrary ...

SAST Tools Must Support Your Embedded Operating Systems, Toolchains & Compilers – Chose Wisely
Embedded software development is very close to the development platform used. Whether it’s bare metal development, commercial RTOS or embedded Linux, the tool chain is an important component in software development. It’s ...