Reachability Analysis with Backslash
Thanks to Backslash for sponsoring this video - they didn't sponsor my opinions or content, only using their platform to talk about reachability analysis and helping me with a test account. Backslash Security can be found here: https://www.backslash.security/
This video explores the concept of reachability analysis in cybersecurity, specifically how it is applied to SAST findings and Software Composition Analysis (SCA) findings. We use Backslash to talk about function level reachability for SCA, and internet reachability for SAST.
00:00 Introduction to Reachability Analysis
00:24 Exploring Reachability with Backslash
01:03 Understanding Reachable Vulnerabilities
02:50 Demonstrating Reachability in Action
03:23 Comparing SCA Tools and Reachability Insights
05:39 Deep Dive into Function Level Reachability
06:06 Exploring Code Level Vulnerabilities with Backslash
08:30 Operationalizing Security Insights
10:47 The Importance of Reachability Analysis
13:24 Conclusion and Contact Information