What is Threat Modeling?

Threat modeling is really just a fancy way of saying: “Let’s think about what could go wrong with our software in advance, so we can stop it before it happens.” When we build applications, most of us usually think about features, speed, and usability. Threat modeling adds another viewpoint: security. Instead of waiting for attackers…

Security Champion Worst Practices – My Slides from Barcelona

Tanya on stage

Thank you very much to everyone who came to my talk at OWASP Global AppSec in Barcelona! It was so lovely to have the chance to speak to so many of you, and to share our experiences around security champion programs — especially the ways they can go wrong, and how to avoid those situations.…

Trip Report: OWASP AppSec PNW

June 15 & 16th, 2024, I was in beautiful Vancouver Canada with my colleagues Amanda McCarvill and Brandan Wu for the annual, local, moving conference that spreads the Pacific North West to give a talk, but it turned into so much more: OWASP AppSec PNW! The night before was the speaker's dinner, where I got…

Level Up Your AppSec Skills with Semgrep Academy!

Hey there, fellow security folks! I've got some absolutely incredible news to share with you today. Brace yourself, because I guarantee you'll be just as excited as I am. Drumroll, please... introducing Semgrep Academy! Are you ready to learn all things application security, secure coding, API security, static analysis, and maybe even some functional programming?…

Trip Report – ThreatModCon and OWASP Global AppSec 2023

Tanya at ThreatModCon

On Oct 29th, 2023, was the very first edition of “ThreatModCon”, a conference dedicated entirely to threat modelling. On the 30th and 31st was “OWASP Global AppSec”, a conference by the OWASP Foundation, dedicated entirely to application security. On November 1st and 2nd, I helped Adam Shostack deliver his 2-day intensive threat modelling training. This…

Choosing API Security Tools

Quite often clients ask me “Which API Security Tool should I buy?”, and as you might have guessed I answer “It depends”, then proceed to ask them a dozen questions. Recently I asked a colleague at Semgrep if they felt this process might be of value to my readers, and Chinmay said “Absolutely!” and here we are with a new blog post. 

The Difference Between SCA and Supply Chain Security

Giant boat, representing a supply chain

Right now, the concept of the software supply chain and securing it is quite trendy. After the solar winds breach, the attack on the crypto wallet, at the log4J fiasco, the entire world appears to be focused on securing the software supply chain. I’m not complaining. If anything, as an application security nerd, I am quite pleased that…

Trip Report – Hacker Summer Camp 2023

Ashish, Adam, me, Tiffany, Shilpi, Anna and new guy!

For those of you who are aware, every August for the past 30 years or so, hackers have been meeting in the dead heat of summer in Las Vegas Nevada to host multiple learning and community events. It started with Def Con, a conference dedicated to hackers & hacker culture, releasing exploits, and “doing stuff…

I’m Joining Semgrep and Bringing We Hack Purple With Me

Image of Tanya Janca wearing a Semgrep T-shirt. She is obviously happy.

Hello my friends! It's me, Tanya Janca from We Hack Purple, and I am beyond thrilled to announce that we are joining forces with Semgrep to take the world of application security by storm! As the new Head of Education and Community, bringing We Hack Purple community and content with me, we will be offering…

Operations First!

Man at computer, performing operations

Many years ago, when I was a software developer, a very smart boss said to me: “Tanya, it’s always operations first. Projects after.” At first, I was confused, how will I make any progress on my projects if I’m always doing operations? And, what the HECK is “operations” anyway? Reader, this was an incredibly important…