Joe Basirico

Bio

Follow on Twitter

Connect on LinkedIn

Joe Basirico has worked in the Software Security Industry for nearly two decades. During this time he has helped companies from startups to Fortune 500 reduce their overall application risk by understanding and balancing business drivers and deep technical concepts.

He has built and led a team of some of the best application security experts and developers in the country, helping to grow his team from an eight-person startup to a leading cybersecurity business. Under his lead the engineering team regularly delivers high value security services, research, and products.

Joe regularly posts here, at ReThink Security, to help share his insights and guidance with leaders in the software security space as well as his personal blog at whoisjoe.com. He speaks at security conferences and has been guests on podcasts. Please reach out to learn more.

Credit: Photo by Eric Prouzet

140,000 People Have Been Laid Off, What’s Next

A hiring manager and a recruiter’s guide to getting hired.

This post is a collaboration between me, Joe Basirico, and one of the best tech recruiters in the industry, Ellen McGarrity. You can learn more about Joe on this website. Throughout you can read Ellen’s take, in her own words in blue text

Ellen has spent her 18-year career focused on recruiting in the software tech industry at both large (Microsoft, Amazon, Salesforce) and small (Tableau, Highspot) companies. She has recruited candidates at all levels, domestically and internationally. Originally based out of Seattle, she now lives in the Bay Area with her husband and 2 daughters.


Read more >>

Credit: Asanan Aphisitworachorch @ Unsplash

Part 3 — Vetting Past Assumptions

This is a multi-part blog series. If you haven’t already I encourage you to read the first two installments:

Part 1 - My First 100 Days in ProdSec at a Series E Startup

Part 2 - From gates to responsibilities

As mentioned in my previous posts, one of the key takeaways from The First 90 days was to understand that past performance and solutions will not necessarily help you in the future. I found this to be strikingly true at Highspot. As a consultant it’s easy to swoop in, find flaws, deliver a report, and move onto the next customer. When you don’t have to sit with your long term decisions or to maintain the day to day relationships, and when you don’t have time to fully understand the reasons and history for current decisions things are a lot simpler.


Read more >>

Credit: unknown

Part 2 - From Gates to Responsibilities

This is part of a multi-part blog series, if you haven’t already, please check out the first post:

Part 1 - My First 100 Days in ProdSec at a Series E Startup

In my first blog post I discussed how I found Highspot and what attracted me to this company. I discussed the immediate challenges I faced as I scaled up my own knowledge and tried to rapidly snap to the new culture and demands of my role. If you haven’t read that already I recommend starting there and coming back.


Read more >>

Credit: Daniel Cheung @ Unsplash
Credit: Joe Basirico

Phase One of Appsec Engineering: Awareness

This is part of a series

  • Introduction
  • Awareness (you are here)
  • Enablement (coming soon)
  • Enforcement (coming soon)

Last week I published a post introducing three important phases of AppSec Engineering: Awareness, Enablement, and Enforcement. Over the next three posts I will dive into each of these topics to share best practices and guidelines you can roll out to optimize your security engineering practice.

In my experience, the best AppSec programs start with AppSec awareness training. The goal is to provide your product team with enough information to know when they need security involvement. That’s a broad statement, so let’s break it down.


Read more >>

Credit: Joe Basirico

The Three Phases of Appsec Engineering

This is part of a series

In order for an AppSec team to collaborate effectively with development teams they should think in three phases: Awareness, Enablement, and Enforcement. This month I’ll be dedicating an article to each. The focus of these articles will be on the critically important area of application security, focused on the roles involved in building software: developers (DevOps), testers, and architects.


Read more >>

Credit: Joe Basirico
Credit: Joe Basirico
Credit: Joe Basirico
Credit: Alan Bishop @ unsplash
Credit: Joe Basirico
Credit: Joe Basirico
Credit: Visual Cinnamon & NY Times

You Have an Obligation to Fight for Privacy

Note: The header image was created by Visual Cinnamon for The New York Times on an opinion piece on digital trackers.

By now everyone is familiar and desensitized to cookie popups that bombard us on our first visit to almost every. These cookie consent alerts are there for a reason, they are required by new legislation such as GDPR and the California CPA. This legislation has been introduced to try to protect consumers from boundless data collection policies , which is a laudable goal. I’m not certain how much of a difference it’s made though as most users accept the terms as quickly as a EULA or a Windows Security Warning popup. Recently Senator Sherrod Brown has realized this and is trying to shift the burden of privacy from consumers onto the companies that hold the data. No longer will it be enough for a company to fall back on the “but you clicked on the Privacy Policy button” defense:


Read more >>

Credit: Joe Basirico & Rob Curran
Credit: Joe Basirico

May 2020 Newsletter

I’m excited to announce that we’ve launched a twitter account. If you’re on twitter, please follow us: @ReThinkSec . I’d like to use twitter to send out interesting articles and insights that may not make it into the newsletter or for topics that are more timely and can’t wait a month to get out. It’s also a good way for you to send interesting topics to me, if there’s something you think would be good for an upcoming article or a piece of news that should be in an upcoming newsletter just @mention us or DM it to us and we’ll help get the word out.


Read more >>

Credit: Kroll Historical Maps
Credit: Joe Basirico (cc attribution)
Credit: Jay Heike @ Unsplash
Credit: Jay Heike @ Unsplash
Credit: Smithsonian American Art Museum and its Renwick Gallery

March 2020 Newsletter

Don’t forget to subscribe to the newsletter to receive this in your inbox as soon as we write them!

While everybody has been discussing the Coronavirus and the elections we have been focused on providing you with the best application security guidance and news out there. 

The March edition of this newsletter brings two new ReThink articles and a variety of interesting articles that I’ve found this month. The threat landscape is evolving. Attackers continue to use novel attack vectors and techniques to gain access to networks and systems. 


Read more >>

Credit: Smithsonian American Art Museum and its Renwick Gallery

February 2020 Newsletter

Don’t forget to subscribe to the newsletter to receive this in your inbox as soon as we write them!

This edition of the ReThink Newsletter includes two new ReThink articles, both of which cover important topics for our industry. It also includes five articles we think are the most interesting or important security news from the industry.

Recent ReThink Articles

Jason published an interview with Loren Kohnfelder, the father of Public Key Infrastructure. Jason met Loren while at Microsoft in the 90’s and both of them have been working on security issues ever since. In this long-form article Jason and Loren discuss PKI history, the current state of security and some predictions for the future . It’s amazing to hear from such an iconic pioneer of cryptography who rubbed elbows with Adelman and Rivest (the R and A in RSA) and get a chance to hear his perspective after over forty years of experience in the field.


Read more >>

Defending Against a Potential for Iranian Cyber Response

I recently had the opportunity to sit in on a conference call with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and got a chance to hear how they’re thinking about protecting against cyber threats after escalating tensions between the US and Iran.

I’d like to summarize what I heard and reference a few useful supporting cybersecurity guidelines.

On the call CISA made it clear that although they’ve prepared a National Cyber Awareness System Alert and a CISA Insights document specific to the increased geopolitical tensions and threats, they have yet not seen an increase in attacks from Iran.


Read more >>

December 2019 Newsletter

Please be sure to subscribe

Don’t forget to subscribe to the newsletter to receive this in your inbox as soon as we write them!

Our last newsletter of the year brings quite a few great new articles from the end of November and the beginning of December. There was a lot going on this month.

We have four new articles and a brand new website. We got a lot of feedback that the old website was slow, difficult to view on mobile, and included an unnecessary amount of JavaScript. So we rewrote it from scratch. The new pages should be blazingly fast and easy to access.


Read more >>

A Hacker’s Manifesto and 2TB Data Breach From Cayman National Bank and Trust

On Saturday a transparency collective named “Distributed Denial of Secretstweeted that they have released a massive data set from a recent breach. Over 2 terabytes of data has been released and is hosted by DDoS and on Torrents. In addition to the data that was released the hacker published a manifesto and hacking guide called “HackBack - A DIY Guide to rob banks" alongside the data dump. The hacker, who goes by Phineas Fisher, originally wrote the HackBack guide in Spanish, however, this morning I found a translated copy. Unfortunately it’s been removed from PasteBin as of this writing, but the Spanish version is still available on DDoS’s site.


Read more >>

Do Cloud Sync Products Protect You From Ransomware?

Since my last post Protecting Yourself and Enterprise from Ransomware Attacks on the history and impact of ransomware I’ve gotten a few questions about whether Cloud Sync products like Dropbox, Box, iCloud, and OneDrive protect you from a ransomware attack. Cloud Sync products are different than Cloud Backup solutions like Mozy, Backblaze, or Carbonite. Backup solutions take a snapshot of your whole hard drive at certain points in time, because of this even if ransomware does encrypt your hard drive and your backup syncs the encrypted files to the cloud you will still have your pre-infection files available to you. Simply pick a pre-infection restore point and start from there.


Read more >>

Getting to Yes

In this post I want to try something new. Rather than writing an article, I’ll capture a dialog between Joe and I as we discuss a topic that interests us both.

On Joe’s recommendation, I recently read Getting to Yes , written by Roger Fisher, William Ury, and Bruce Patton for the Harvard Negotiation Project. The book is nearly thirty years old, but it has been continuously updated and it still contains lessons worth learning. As I read the book I found that I was already using some of the techniques, but there were many more that either I hadn’t been exposed to or that I was employing only partially, and as a result I was being less effective than I could be. Even more importantly, the book taught me an overall framework for thinking about negotiation that I can now use to improve both my personal and professional life.


Read more >>