Tech Talk Episode 2: Finding Malicious JavaScript that Compromises Your Code

Presented by

Amir Shaked, SVP R&D, Avishai Shafir, Director of Cybersecurity Strategy

About this talk

Software engineers focus on releasing software as fast as possible. To speed up the process, development teams often take advantage of modular code from open-source repositories, third-party vendor scripts or common libraries that are freely available. Unfortunately, this could end up unintentionally introducing malicious JavaScript that may expose the whole environment to security vulnerabilities -- sometimes immediately or at a later time when the code’s origin has been long forgotten. This code from bad actors often hides in what many developers assume to be reputable sources. In this Tech Talk, we will discuss: -How to identify JavaScript that is malicious -Differences between security scanners and security monitors -Ways to eliminate the tension between Security Teams, DevSecOps and Developers You’ll walk away from this session with new ideas that you can put into practice quickly, so invite your team. The first 50 attendees will also receive a $20 gift card to use online with a PerimeterX customer.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (97)
Subscribers (9612)
HUMAN is a cybersecurity company that protects organizations by disrupting digital fraud and abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trillion digital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN. To Know Who’s Real, visit