Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Apr 1, 2013
With this four part video series on secure programming, Red Hat is pleased to share our learnings and recommended practices to help create awareness for producing secure code. The goal of this series is to increase developer awareness of common software flaws that affect security, regardless of the programming language. The four parts are: 1. Input Validation - understanding the importance of checking external inputs 2. Numeric Errors - the dangers of using incorrect data types 3. Authorization - looking at user privileges, levels of access, and how they're different 4. Security Mentality - how can developers start to adopt a security-like mentality, also known as the "security mindset"
Revisit this site often for upcoming videos, or visit here http://red.ht/XXCeCn for more information. Comments or questions can be sent to RHELdevelop at redhat dot com.
About the author: Josh Bressers - Lead, Red Hat Product Security Team
Josh Bressers founded and heads the Red Hat Product Security Team. The group is responsible for working with product groups to incorporate software assurance practices into their development. Josh was previously a Senior Software Engineer in the Red Hat Security Response Team and has over ten years of experience working on security issues with the open source community.