undefined

Tanya Janca

Author of Alice and Bob Learn Secure Coding and other books on application security. A prolific blogger and trainer of software developers and IT security professionals.

Top 3 podcasts with Tanya Janca

Ranked by the Snipd community
undefined
6 snips
Mar 6, 2025 • 1h 12min

SE Radio 658: Tanya Janca on Secure Coding

In this discussion, Tanya Janca, author of 'Alice and Bob Learn Secure Coding' and a leading voice in application security, shares her insights on integrating security throughout the software development lifecycle. She emphasizes the importance of defining security requirements early and using threat modeling in design. Tanya details secure coding practices, effective testing strategies like SAST and DAST, and the necessity of continuous security monitoring post-deployment. With a focus on practical techniques and real-world examples, she guides developers on enhancing software security.
undefined
Mar 3, 2025 • 2h 3min

First Do No Harm - Security Challenges in Healthcare - Ed Gaudet, Tanya Janca - ESW #396

In a riveting discussion, Tanya Janca, developer relations at Semgrep and author of 'Alice and Bob Learn Secure Coding,' joins Ed Gaudet, CEO of SenseNet, to tackle cybersecurity in healthcare. They explore why healthcare remains tough to disrupt and emphasize the critical need for enhanced security amidst rising ransomware threats. Tanya shares insights from her book on secure coding, while Ed highlights the unique risks rural healthcare facilities face. Their engaging conversation underscores the urgent mission to safeguard patient safety in the evolving digital landscape.
undefined
Jan 7, 2025 • 49min

#175 Tanya Janca, Secure Coding

In this engaging discussion, Tanya Janca, Head of Community at Semgrep and security trainer at She Hacks Purple, shares insights from her new book aimed at helping developers write secure code. She emphasizes the critical importance of validating inputs and adopting a zero-trust security model. Tanya discusses balancing security with usability, especially in sensitive environments like hospitals. She also explores effective strategies for securing legacy applications and the need for continuous security testing in the software development lifecycle.