Tech Talk Episode 2: Finding Malicious JavaScript that Compromises Your Code

Presented by

Amir Shaked, SVP R&D, Avishai Shafir, Director of Cybersecurity Strategy

About this talk

Software engineers focus on releasing software as fast as possible. To speed up the process, development teams often take advantage of modular code from open-source repositories, third-party vendor scripts or common libraries that are freely available. Unfortunately, this could end up unintentionally introducing malicious JavaScript that may expose the whole environment to security vulnerabilities -- sometimes immediately or at a later time when the code’s origin has been long forgotten. This code from bad actors often hides in what many developers assume to be reputable sources. In this Tech Talk, we will discuss: -How to identify JavaScript that is malicious -Differences between security scanners and security monitors -Ways to eliminate the tension between Security Teams, DevSecOps and Developers You’ll walk away from this session with new ideas that you can put into practice quickly, so invite your team. The first 50 attendees will also receive a $20 gift card to use online with a PerimeterX customer.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (80)
Subscribers (8446)
PerimeterX protects the modern web and mobile applications, and APIs from automated attacks. We protect against account abuse, carding, scraping, checkout abuse, marketing fraud, PII harvesting, skimming and watering hole attacks.