
Matias Madou
Contributor at Freelance
Ph.D., CTO and co-founder Secure Code Warrior. Helping companies getting software security right by offering a scalable solution to empower and help developers.
Articles
-
1 week ago |
devopsdigest.com | Matias Madou
CISA's Product Security Bad Practices paper is one that every company should review as it details the "exceptionally risky software development activities" that are all too common in the industry. A critical bad practice, CISA points out, is the use of memory-unsafe programming languages such as C and C++, which are still widely used but increase risk.
-
2 weeks ago |
builtin.com | Matias Madou
By now, artificial intelligence (AI) advancements command a seemingly ubiquitous presence in the modern professional’s toolkit. And software development teams prove no exception: Eighty-six percent of companies are currently incorporating AI into the software development life cycle (SDLC), and 93 percent plan to boost their AI investments further.
-
3 weeks ago |
devops.com | Matias Madou
In April 2023, the Cybersecurity and Infrastructure Security Agency (CISA) launched its Secure by Design initiative, directing technology companies to ‘prioritize the security of customers as a core business requirement, rather than merely treating it as a technical feature’.
Year of the Twin Dragons: Developers Must Slay the Complexity and Security Issues of AI Coding Tools
1 month ago |
securityweek.com | Matias Madou
For software developers working at breakneck speeds to keep up with a growing list of demands and obligations, the arrival of artificial intelligence (AI) coding assistants several years ago was a blessing. Developers quickly became avid users of the generative AI models that accelerated the code-creation process and speed of delivery. But on the heels of that undeniable initial benefit, the other shoe has fallen, adding layers of complexity to an increasingly complex environment.
-
1 month ago |
kbi.media | Matias Madou
How Adopting Maturity Models Can Improve Enterprise IT Security With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 945
- DMs Open
- No

RT @DarkReading: TMI Tech: How to Stop Vulnerable Software from 'Oversharing' https://t.co/hjPf8XOuu8 by @mmadou @SecCodeWarrior

RT @thecyberwire: OpenSSL patched, misconfiguration risk, #cyberespionage, Truss's #hacked phone, Ukraine's #cyber defense, & DNS threats.…

RT @sdtimes: Next up on Companies to Watch 2023 is @SecCodeWarrior with their approach to learning combines defensive and offensive, framew…