![Jenny Buckingham Jenny Buckingham](/sites/default/files/styles/medium/public/pictures/Jenny%20Buckingham%20Headshot.jpg?itok=cT5pAvLh)
Jenny Buckingham
Jenny Buckingham is a Product Marketing Manager helping developers and security professionals secure their cloud-native application development. With a focus on understanding her customer’s needs, she helps companies leverage powerful solutions to overcome security challenges.
Stay up to date on Application Security
- | By Jenny Buckingham
DevSecOps is a modern approach to software development that implements security as a shared responsibility throughout application development, deployment, and operations. As an extension of DevOps principles, DevSecOps helps your organization integrate security testing throughout the software…
Read Article
- | By Jenny Buckingham
Web applications are one of the most common vector for breaches, accounting for over 40% of breaches according to Verizon's 2022 Data Breach Report. Ensuring that your web applications are sufficiently protected and continue to be monitored once they are in production is vital to the security of…
Read Article - | By Jenny Buckingham
In the dynamic world of software development, Application Programming Interfaces (APIs) serve as essential conduits, facilitating seamless interaction between software components. This intermediary interface not only streamlines development but also empowers software teams to reuse code. However,…
Read Article - | By Jenny Buckingham
Application Security Testing (AST) encompasses various tools, processes, and approaches to scanning applications to uncover potential security issues. Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) are popularly used security testing approaches that…
Read Article - | By Jenny Buckingham
Cloud-native software development is a driving force because it empowers teams to build and deploy applications at speed and scale. Along with microservices, cloud infrastructure, and API’s, containers are a crucial part of this development process. Let’s look at the security implications of…
Read Article