Security can be intimidating as there’s a lot to keep up with. But there is one very simple thing that you can do which will go a long way towards keeping your software system secure: keep your dependencies up to date. Learn why this is so important by examining a real-world cautionary tale of security gone awry in this video.
- [Instructor] Security, such an anxiety-inducing term, … especially on a small budget. … So what can you do or what should you do … to help keep your system secure? … The most basic and perhaps most important thing … that you can do is keep your dependencies up to date … so that you don't expose your users … to the security vulnerabilities … that have been published in the libraries that you're using. … For example, in 2017, Equifax experienced a data breach … that exposed its user data to the outside world. … In looking at that breach from afar, … it is reasonable to develop … some assumptions about the cause. … You might assume that Equifax, being a large company, … with a large development team, again, all assumptions, … had developed custom code which was taken advantage of … because it wasn't developed securely. … But that's not what happened. … Equifax was breached because one of their dependencies … contained a published security vulnerability … and they didn't upgrade in time, …
Author
Released
3/28/2019- Code quality metrics and tools
- Exploring code complexity
- Adjusting complexity thresholds
- Analyzing hotspots and churn
- Visualizing code coverage
- Finding duplication
- Securing dependencies
- Maintaining a consistent coding style
Skill Level Intermediate
Duration
Views
Related Courses
-
Agile Software Development
with Shashi Shekhar1h 53m Beginner -
Agile Software Development: Refactoring
with Richard Kasperowski1h 31m Intermediate
-
Introduction
-
1. Code Quality
-
What is code quality?1m 28s
-
-
2. Complexity
-
What is complexity?2m 39s
-
Adjust thresholds3m 36s
-
-
3. Hotspots and Churn
-
What are hotspots and churn?2m 22s
-
-
4. Code Coverage
-
What is code coverage?2m 56s
-
Windows setup2m 9s
-
macOS X setup3m 19s
-
-
5. Duplication
-
What is duplication?2m 10s
-
-
6. Securing Your Dependencies
-
Why secure dependencies?1m 51s
-
Setting up Snyk1m 24s
-
-
7. Consistent Coding Style
-
Why consistent coding style?1m 40s
-
Setting up Flask2m 1s
-
-
Conclusion
-
Next steps36s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Why secure dependencies?