-
Notifications
You must be signed in to change notification settings - Fork 0
/
articles.html
116 lines (110 loc) · 8.21 KB
/
articles.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
<!DOCTYPE html>
<html>
<head>
<title>Jonathan Knudsen</title>
<style>
p, ul {
font-size: 160%;
}
a {
text-decoration: none;
}
</style>
</head>
<body>
<!-- Menu -->
<p>
<a href="index.html">Home</a> |
<a href="articles.html"><b>Published Work</b></a> |
<a href="books.html">Books</a> <!-- |
<a href="resume.html">Resume</a>-->
</p>
<hr />
<ul>
<li><a href="https://www.forcepoint.com/resources/podcast/software-hope-strategy-jonathan-knudsen-part-2"
target="_blank">🎧 To The Point podcast: With Software, Hope is a Strategy? With Jonathan Knudsen (Part 2)</a></li>
<li><a href="https://www.forcepoint.com/resources/podcast/software-hope-strategy-jonathan-knudsen"
target="_blank">🎧 To The Point podcast: With Software, Hope is a Strategy? With Jonathan Knudsen (Part 1)</a></li>
<li><a href="https://youtube.com/playlist?list=PL8ULkF8qvsgT1lvl3Vck6te-2ZTY4Livs"
target="_blank">📺 CyRC Developer Series OWASP Top 10</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyrc-special-report-gaming-apps-security-analysis/"
target="_blank">CyRC special report: Secure apps? Don’t bet on it</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyrc-report-log4shell/"
target="_blank">CyRC Special Report: How companies fared in the aftermath of Log4Shell</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyrc-case-study-securing-bind-9/"
target="_blank">CyRC Case Study: Securing BIND 9</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-analysis-gzip/"
target="_blank">CyRC Vulnerability Analysis: CVE-2022-1271 in gzip, but it’s not as bad as it sounds</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyrc-advisory-spring-vulnerabilities-spring4shell-cve-2022-22963/"
target="_blank">CyRC Vulnerability Analysis: Two distinct Spring vulnerabilities discovered – Spring4Shell and CVE-2022-22963</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/how-to-cybersecurity-software-supply-chain-components/"
target="_blank">How to cybersecurity: Software supply chain security is much bigger than you think</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/manage-vulnerabilities-with-proactive-security-process/"
target="_blank">How to cybersecurity: Gravity is a harsh mistress</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/effective-software-supply-chain-risk-management/"
target="_blank">How to cyber security: Software supply chain risk management</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/bind-9-vulnerability-discovery/"
target="_blank">A stitch in BIND saves nine</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/heartbleed-vulnerability-appsec-deep-dive/"
target="_blank">How to cybersecurity: Heartbleed deep dive</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/application-security-policies-and-process/"
target="_blank">How to cyber security: Butter knives and light sabers</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/invisible-application-security/"
target="_blank">How to cyber security: Invisible application security</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/addressing-developer-security-fatigue/"
target="_blank">How to cyber security: Addressing security fatigue</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/embedding-security-sdlc/"
target="_blank">How to cyber security: Embedding security into every phase of the SDLC</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq/"
target="_blank">CyRC Vulnerability Advisory: Denial of service vulnerabilities in RabbitMQ, EMQ X, and VerneMQ</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/ast-solutions-data-insights/"
target="_blank">How to cyber security: Leverage AST solution data to make risk-based decisions</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/5g-networks-software-security/"
target="_blank">How to cyber security: 5G is not magic</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/improve-development-velocity-intelligent-orchestration/"
target="_blank">How to cyber security: Minimize risk and testing time with Intelligent Orchestration</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/containerizing-fuzzing-targets/"
target="_blank">How to cyber security: Containerizing fuzzing targets</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/proactive-devsecops/" target="_blank">How to cyber
security: Faceplanting in 10 lines of code</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/software-security-shared-responsibility/"
target="_blank">How to cyber security: Software security is everyone's responsibility</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/fuzzing-bitcoin-protocol-defensics-sdk/"
target="_blank">Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/defensics-sdk-fuzzing-bitcoin/"
target="_blank">Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/devsecops-velocity/" target="_blank">How to cyber
security: Gotta go fast...but why?</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/application-security-testing-devops/"
target="_blank">New survey shows integrating application security testing gaining traction in DevOps</a>
</li>
<li><a href="https://www.synopsys.com/blogs/software-security/devsecops-intelligent-orchestration/"
target="_blank">How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/how-to-cyber-security-pain-in-the-ast/"
target="_blank">How to cyber security: Pain in the *AST</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/defensics-sdk-fuzz-custom-protocol/"
target="_blank">How to Cyber Security: Fuzz a tank</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/fuzzing-agent-instrumentation-framework/"
target="_blank">Find more bugs by detecting failure better: An introduction to
SanitizerProcessMonitorAgent</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/software-security-testing-is-cool/"
target="_blank">How to Cyber Security: Software testing is cool</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/fuzzing-test-cases-not-all-random/"
target="_blank">How to Cyber Security: Fuzzing does not mean random</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/data-protection-threat-modeling-vulnerability-management/"
target="_blank">How to Cyber Security: Application security is critical for data security</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/working-from-home-tips/" target="_blank">Tips for
working from home without losing your marbles or compromising security</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/software-open-source-components/"
target="_blank">How to Cyber Security: Software is manufacturing</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/security-testing-developers/" target="_blank">How
to Cyber Security: It's all about developers, except when it's not</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/small-steps-cyber-security/" target="_blank">How
to Cyber Security: A journey of a thousand miles</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/information-technology-software-critical-infrastructure/"
target="_blank">How to Cyber Security: Software is critical infrastructure</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/cyber-security-group-unicorn-donkey/"
target="_blank">How to Cyber Security: Unicorns and donkeys</a></li>
</ul>
</body>
</html>