deploying security

14 RESULTS
50:36
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail: Is your Child Safe from the Internet of Things?
GOTO Berlin 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Copenhagen 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Berlin 2018
50:57
Insecure Transit - Microservice
Insecure Transit - Microservice
GOTO Berlin 2018
47:18
Introduction to OAuth 2.0 and OpenID Connect
Introduction to OAuth 2.0 and OpenID Connect
GOTO Berlin 2018
43:37
SSL/TLS for Mortals
SSL/TLS for Mortals
GOTO Berlin 2018
44:19
Securing the JVM
Securing the JVM
GOTO Berlin 2018
35:29
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
YOW! Sydney 2023
35:29
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
YOW! Brisbane 2023
35:29
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
YOW! Melbourne 2023
Mapping CI/CD Attack Surfaces
Mapping CI/CD Attack Surfaces
GOTO Copenhagen 2023
Browse all tags
Here