CloudDevelopersDevOpsSecurityTo The Point

How Threat Modeling Visualization Helps Developers

0

Guest: Barak Schoster (LinkedIn, Twitter)
Company: Palo Alto Networks (Twitter)
Show: To The Point
Keyword: Software Supply Chain Security

Palo Alto Networks’ new feature, supply chain graph, is a real-time auto-discovery of potentially misconfigured infrastructure and application files, enabling developers to see a full threat model of their entire application. It helps developers understand what impact code changes have on the entire application. While writing good code in the first place is obviously the preferred route, being able to see and address issues early on before production will make life easier in the long run for developers. Barak Schoster, Senior Director, Chief Architect at Palo Alto Networks, explains why full threat model visualization makes developers lives easier. To find out more, watch this video.

About Barak Schoster: Based in Tel Aviv, Barak spends his time helping teams secure cloud infrastructure. He is the creator of Checkov and often contributes to other open source projects. He has previously worked for RSA, focused on cybersecurity machine learning and big data architecture, as well as at Fortscale and IDF tech unit.

About Palo Alto Networks: Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Don't miss out great stories, subscribe to our newsletter.

What Tools Can Help Secure Kubernetes?

Previous article

How To Combat Cloud-Native Application Security Threats

Next article
Login/Sign up