Unlock the power of secure coding with Jim Manico! 💡 Dive into the world of application security and learn from an expert like never before.🤩
Get ready to have your mind blown as Jim Manico shares his deep knowledge on application security using generative AI. 🌟 Discover groundbreaking insights, practical tips, and game-changing strategies that will elevate your coding skills to a whole new level.
You can read the complete transcript of the epiosde here >
Learnings from the podcast
- When it comes to code generation using Gen AI tools, trust but Verify. Always run those through your DevSecOps pipelines for static & dynamic scans.
- During prompt engineering, stay away from feeding sensitive information and ask for low cyclomatic complexity recommendations. It’s simpler and easier to maintain.
- On top of adding security capabilities, when using any framework like React or Ruby on Rails, use them securely and apply application security best practices on top of it. Like OWASP Top 10 recommendations.
Learning resources recommended by Jim Manico
-
OWASP Top 10 for Large Language Model Applications
Aims to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing Large Language Models (LLMs)
Check the OWASP Top 10 for LLMs here >
-
Steve Wilson - Author of OWASP Top 10 for LLMs
With over 20 years of experience in software product development and business leadership, Steve is passionate about building high-leverage platforms and high-performance teams.
-
OWASP Application Security Verification Standard (ASVS)
The OWASP Application Security Verification Standard (ASVS) Project is a framework of security requirements that focus on defining the security controls required when designing, developing and testing modern web applications and web services.
Check OWASP Application Security Verification Standard >
-
Secure Coding for Software Engineers by James Ma
In this comprehensive guide spanning six insightful topics, you’ll embark on a journey through the critical aspects of secure software development. From understanding the intricacies of authentication and authorization to mastering the art of validation, encoding, and robust error handling, this book equips you with the essential skills to fortify your code against vulnerabilities