Tanya Janca | SheHacksPurple :verified: :verified:

Author of Alice and Bob Learn Secure Coding AND Alice and Bob Learn Application Security!
She/her/lady/woman. shehackspurple.ca

Secure Coding Training and Public Speaking Inquiries & other:
Tanya (at) shehackspurple (dot) ca

#AppSec, #DevSecOps 🌻

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

Legacy apps....

a very problematic vehicle
Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

Teacher asks students to get AI to write a report for them, then research all the ways it's wrong. Thoughts?

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

@nikatjef πŸ’”

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

@sternecker πŸ’” I wish you weren't right

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

Do you think the industry is better or worse at secure development now than it was 5 years ago? Why? Why not? #talkappsectome 

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

@rjohnston Fixed! Phew

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

The Psychology of Bad Code

In this blog series I will explore several known bad developer behaviors that lead to insecure software, as well as how we can combat them by applying behavioral economic interventions. This series is an expansion upon my thoughts from my conference talk β€˜Threat Modeling Developer Behavior: The Psychology of Bad Code’.

shehackspurple.ca/2025/11/27/t

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

@rjohnston thank you for telling me. How's strange. One sec

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-28

@sephster πŸ’œπŸ’œπŸ’œ

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

The Psychology of Bad Code, part one of a very long blog series on why we write insecure code, and how I hope we can do better. Includes slides from my new talk: Threat Modeling Developer Behaviour: The Psychology of Bad Code!

twp.ai/4itBN9

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

@0x58 I think once we've finalized it. It's still open for comment.

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

My ask:
βœ… Download the doc
βœ… Start conversations with your dev & security teams about what to do, not just what to avoid. πŸ™
twp.ai/9PYCKl
5/5

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

BRAND NEW:
A10 Mishandling of Exceptional Conditions. Error handling MATTERS, and it’s time we talk about it, and how to do it correctly and safely.

4/5

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

In this edition:
β€’ A01 Broken Access Control remains #1: the most serious risk we’re facing.
β€’ A02 Security Misconfiguration moves up to #: configuration mistakes keep happening.
β€’ A03 Software Supply Chain Failures is significantly expanded. It's more than dependencies!
3/5

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

Why does it matter? Because we've updated the items to match wasn't happening RIGHT NOW in industry. Breaches keep happening, and we need updated advice.
2/5

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-27

Big news in #AppSec: the #OWASP Top 10 2025 is now available! I'm part of the project team and ALL OF US want every dev, security engineer, and leader to read it (please).

twp.ai/4isx8h

1/5

The new owasp top ten, the list of items
Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-26

Me: puts on music while making content
Also me: gets distracted, music is too good! Turns it off.

5 minutes goes by...

Me: I should put on music....

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-26

@rjohnston I think you're saying that you wish you knew how to threat model. I should create content on this!!

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-26

@trevdev you can do it!!!! πŸ’ͺπŸ’ͺπŸ’ͺπŸ’ͺ

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-11-26

@sephster @kayla what types of things do you want to learn? Hacking or secure coding? Architecture?

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst