Abhay Bhargav (@abhaybhargav) 's Twitter Profile
Abhay Bhargav

@abhaybhargav

AppSec Expert with over 15 yrs of experience | Author of 2 books and Black Hat Trainer | Building the world's best Security Training Platform, @AppSecEngineer

ID: 24335220

linkhttps://appsecengineer.com calendar_today14-03-2009 05:25:59

9,9K Tweet

6,6K Followers

650 Following

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

"We believe that using the tools is easier than training or threat modeling" Said the AppSec head of an org that I know from experience, has constantly had epic fails on security. Yet, they're doubling down on a losing strategy. Buy expensive 💩, and hope the problems that they

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

A young colleague of mine, asked me today " I fear AI will replace my job in near future. What's your perspective on this ? and what would you advise me to be immune to this?" This is hitting people and rightfully so. I work with AI and build things on AI everyday and I am

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

Security Interchange formats that can help you standardize vulnerability management and exchange it across multiple diverse systems: SARIF - Static Analysis Results Interchange Format. Used for SAST, SCA VEX - Vulnerability EXchange. Provides context about whether a

Security Interchange formats that can help you standardize vulnerability management and exchange it across multiple diverse systems: 

SARIF - Static Analysis Results Interchange Format. Used for SAST, SCA

VEX - Vulnerability EXchange. Provides context about whether a
Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

Security Unit Tests are an extremely underrated way to great Application Security. * Can be used to test cases of AuthN and AuthZ at great speed * Can be used to verify simple controls in the pipeline without DAST/IAST * Can be used to test and verify policy-as-code and IaC

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

A less discussed aspect of being a great Security Architect is this: Can you build security into the architecture with it being easy to modify as the system scales or changes? So many overengineered and unmaintainable security implementations come from the absence of this

A less discussed aspect of being a great Security Architect is this:

Can you build security into the architecture with it being easy to modify as the system scales or changes?

So many overengineered and unmaintainable security implementations come from the absence of this
Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

Team's been working on a bunch of AI pentesting, red-teaming, Threat Modeling and Security Architecture review engagement. Real talk: GenAI products are very probablistic and while they can be security tested, I think its much more useful doing a Threat Model + Security

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

"We weren't aware of the depth of this issue" I have spoken to 4 customers this week. Each of them have gone "full steam ahead" on AI initiatives. They've implemented custom models, fine-tuned existing ones. Implemented Inference interfaces with Agentic and non-Agentic RAG,

"We weren't aware of the depth of this issue"

I have spoken to 4 customers this week. Each of them have gone "full steam ahead" on AI initiatives. 

They've implemented custom models, fine-tuned existing ones. Implemented Inference interfaces with Agentic and non-Agentic RAG,
Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

I am such a South Indian boy. I’ve tried magnesium, melatonin gummies, and everything under the sun to help me sleep better and turns out that the best sleep I get, is after I eat some curd rice

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

Aah, the wonderful security theater of indian banks. They'll disable copy-paste for password and break password managers. But.... they'll transmit financial transactions in cleartext 😬

Aah, the wonderful security theater of indian banks.

They'll disable copy-paste for password and break password managers.

But....

they'll transmit financial transactions in cleartext 😬
Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

As I have been saying repeatedly. All your devs are code reviewers. And they need to especially review this code for security

Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

I dont work much with MSFT products. But I've recently been working with the Graph API and find that it's pretty good. A single unified API across most (if not all) MSFT cloud products. Even the Access Control Params seem a little more manageable. Atypical for Microsoft