Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds

CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds

Posted on August 8, 2025August 8, 2025 By CWS

Software program is transferring quicker than ever…and so are the threats chasing it. From AI-powered assaults to hidden dangers within the software program provide chain, safety and improvement groups are being compelled to unravel issues they’ve by no means confronted earlier than.

CodeSecCon 2025, happening August 12-13, is the place these issues get pulled into the sunshine. Over two days, the free, digital convention will unite safety leaders, engineers, and DevOps execs to deal with at this time’s most pressing challenges and to discover the breakthroughs that might redefine how we construct and defend fashionable purposes.

From Unsolved Issues to Rising Dangers

Even with a long time of progress, utility safety nonetheless has unfinished enterprise. Clinton Herget of Snyk will open the dialog on persistent gaps — from inaccurate static testing to the elusive dream of risk-based prioritization — asking whether or not AppSec is preserving tempo with innovation or falling behind.

And whereas open supply fuels innovation, Adam La Morre of Chainguard will expose a lesser-known threat: the mismatch between revealed packages and their upstream supply, a silent provide chain vulnerability that might have an effect on thousands and thousands of purposes.

Rethinking Compliance, Coaching, and Belief

SBOMs have been hyped, criticized, and controlled. Michael Lieberman of Kusari will transfer past the controversy to point out tips on how to make them actionable, turning a compliance requirement right into a safety asset.

Shifting left is one factor, however Boomie Odumade argues that lasting safety comes from instructing proper. Her session will unpack how related, behavior-shaping coaching can embed safety into the developer mindset.

And with non-human identities already outnumbering people in enterprise methods, Dwayne McDaniel of GitGuardian will discover tips on how to safe this fast-growing, simply exploited assault floor.

AI: The Alternative and the Menace

AI runs by means of a lot of this 12 months’s agenda — each as a defensive software and a brand new frontier for attackers.Commercial. Scroll to proceed studying.

Anupam Chansarkar of Amazon will present how LLM hallucinations can create exploitable vulnerabilities, and the way cross-verification will help.

Nikhil Kassetty will define a DevSecOps blueprint for embedding AI into purposes with out exposing new dangers.

David Burns of BrowserStack will discover the Mannequin Context Protocol (MCP) and the safety challenges of AI brokers that may act, browse, and automate.

Constructing Safety for Scale

Different classes dive into scaling safety for contemporary architectures:

Hitesh Subnani of Amazon on code-to-cloud visibility for tighter suggestions loops.

Manas Sharma of Google on ML-driven database defenses that adapt in milliseconds.

Vaishnavi Gudur of Microsoft on AI-powered net safety that detects and stops threats in actual time.

CodeSecCon is a dwell dialog about the place software program safety is headed, and the way we will get there safely. In case you’re constructing, defending, or governing fashionable purposes, that is the place you’ll discover the methods, instruments, and friends that can assist you sustain.

📅  August 12–13, 2025🌐  See the total agenda at codeseccon.com

Security Week News Tags:Chapter, CodeSecCon, Securitys, Software, Unfolds

Post navigation

Previous Post: AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
Next Post: Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise

Related Posts

Lanscope Endpoint Manager Zero-Day Exploited in the Wild Lanscope Endpoint Manager Zero-Day Exploited in the Wild Security Week News
Raven Secures M to Enhance Cloud Security Solutions Raven Secures $20M to Enhance Cloud Security Solutions Security Week News
Gladinet CentreStack Flaw Exploited to Hack Organizations Gladinet CentreStack Flaw Exploited to Hack Organizations Security Week News
James Bishop Appointed Pentagon’s New Cybersecurity Chief James Bishop Appointed Pentagon’s New Cybersecurity Chief Security Week News
Axonius Acquires Medical Device Security Firm Cynerio in 0 Million Deal Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal Security Week News
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark