Srinivas Kedarisetty
Srinivas Kedarisetty - Security Product Owner
Srinivas has more than 18 years of experience in leading IT delivery teams across India, the U.S. and Europe while managing product security, microservices and SDK. Highly skilled in developing and driving products from conception through the entire product lifecycle, Srinivas has a track record of improving products and teams to create value for customers.
How to Use DevSecOps to Support Efficient and Secure Cloud Migration.
Moving to the Cloud? You Need DevSecOps.
Learn Five Ways DevSecOps Reduces Risk Throughout Software Development.
5 Ways DevSecOps Reduces Risk
Making a case for DevSecOps
A Case for DevSecOps
To shift even further left, security and development teams should consider architectural blueprinting to build security into design.
Application Security: Next-Gen Security Includes Architectural Blueprinting
Follow these best practices for better data protection, more accurate security analysis and confident decision making.
Application security: 2 Steps to Improve Your Secure Engineering
CAST provides continuous support for OWASP Top Ten vulnerabilities, providing users with an automated validation of protection. This helps development teams detect places where vulnerabilities are left in code.
Application Security Vulnerability Detection
The Open Web Application Security Project (OWASP) aims to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP provides impartial, practical information about AppSec. This post reviews known OWASP vulnerabilities detected by CAST's software analysis.
Application Security Vulnerabilities Detectable by CAST
Application security standards are established by leading industry research and standards bodies to help organizations identify and remove application security vulnerabilities in complex software systems...
Application Security Standards
Knowing the difference between true positives and false positives for Application Security Testing.
Reduce False Positives in Application Security Testing
How to choose the right security solution for your AppSec Strategy.
SAST, DAST and IAST - What's the Difference?