deploying security

14 RESULTS
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail: Is your Child Safe from the Internet of Things?
GOTO Berlin 2018
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Copenhagen 2018
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Berlin 2018
Insecure Transit - Microservice
Insecure Transit - Microservice
GOTO Berlin 2018
Introduction to OAuth 2.0 and OpenID Connect
Introduction to OAuth 2.0 and OpenID Connect
GOTO Berlin 2018
SSL/TLS for Mortals
SSL/TLS for Mortals
GOTO Berlin 2018
Securing the JVM
Securing the JVM
GOTO Berlin 2018
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
YOW! Sydney 2023
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
YOW! Brisbane 2023
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
Why Security Initiatives Are Doomed to Fail and What You Can Do About It
YOW! Melbourne 2023
Mapping CI/CD Attack Surfaces
Mapping CI/CD Attack Surfaces
GOTO Copenhagen 2023
Browse all tags
Here