About
Javan Rasokat
Founder of asec.appJavan is a Application Security Specialist, with a passion for helping development teams enhance the security of their software development process. On the side he is lecturing Secure Coding at DHBW University. His journey as an ethical hacker began at an early age, where he began to automate online games using bots and identified security bugs, which he then reported to the game operators. Javan made his interests into his profession and began as a full stack web and mobile software engineer before transitioning into a passionate IT Security Consultant. He brings experience as a penetration tester and holds several certifications, including CISSP, CCSP, CSSLP, GXPN, and CEH, alongside a master's degree in IT Security Management. Javan has also published research and presented so at international security conferences such as OWASP AppSec SanFran, Ekoparty, and HITB Singapore.
Interested? Let's connect on LinkedIn, Twitter or write me an email to javan@asec.app
Application Security as a Service
We are here to help you to level up your organisations Product Security, upskilling your engineers and ideally making our service become disposable. Based on our long experience in this field you'll safe time, not wasting budgets for tools you won't use and bringing your security posture to a new level.
How can I identify and prioritize security vulnerabilities in my software?
What is the best approach for implementing secure development practices?
How can I improve the security of my containerized applications?
What is the most effective way to conduct a penetration testing strategy?
What are the most critical security controls to implement?
What steps can I take to secure my web applications?
How can I train my developers to write more secure code?
What is the best way to conduct a threat model review?
How can I ensure the security of my software supply chain?
What is the best approach for implementing a web application firewall?
How can I ensure my software meets the ASVS standard?
What is the most effective approach for secure continuous integration and deployment?
What is the best way to monitor dependencies for security vulnerabilities?
How can I implement an effective bug bounty program?
How can I ensure my organization has a strong security culture and security champions in place?
We are here to help you answer all those questions.