Home Tags Cyber security

cyber security

161 RESULTS
31:44
Mastering Web Security: Myths, Strategies & More!
Mastering Web Security: Myths, Strategies & More!
GOTO Unscripted
28:28
Application Security: Inside Out
Application Security: Inside Out
GOTO Amsterdam 2023
44:19
Securing the JVM
Securing the JVM
GOTO Copenhagen 2019
46:37
Does Agile Make Us Less Secure?
Does Agile Make Us Less Secure?
GOTO Copenhagen 2019
51:04
A Practical Guide to Cybercrime
A Practical Guide to Cybercrime
GOTO Copenhagen 2019
47:44
OAuth Tokens As Your Identity API
OAuth Tokens As Your Identity API
GOTO Copenhagen 2019
41:58
The Future of Security
The Future of Security
GOTO Copenhagen 2019
39:44
Mapping CI/CD Attack Surfaces
Mapping CI/CD Attack Surfaces
GOTO Copenhagen 2023
29:39
Crafting Robust Architectures for a Resilient Future
Crafting Robust Architectures for a Resilient Future
GOTO Unscripted
50:14
Lessons From Billions of Breached Records [Live Streamed]
Lessons From Billions of Breached Records [Live Streamed]
GOTO Aarhus 2023
42:39
Concurrency Abstractions for Application Security
Concurrency Abstractions for Application Security
GOTO Aarhus 2023
48:59
Protect Your Code with GitHub Security Features
Protect Your Code with GitHub Security Features
GOTO Aarhus 2023
38:44
Competence Development Through Capture the Flag and Virtual Hacker Labs
Competence Development Through Capture the Flag and Virtual Hacker Labs
GOTO Aarhus 2023
40:11
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
GOTO Aarhus 2023
38:10
Shaping Language in Cybersecurity For People
Shaping Language in Cybersecurity For People
GOTO Aarhus 2023
39:43
Principles For Secure and Reliable Systems
Principles For Secure and Reliable Systems
GOTO Aarhus 2023
48:38
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
GOTO Copenhagen 2023
47:47
Sandworm Q&A
Sandworm Q&A
GOTO Copenhagen 2023
31:13
It’s a Kind of Magic: Computation on Ciphertexts
It’s a Kind of Magic: Computation on Ciphertexts
GOTO Copenhagen 2023
50:36
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail: Is your Child Safe from the Internet of Things?
GOTO Berlin 2018
50:36
#ToyFail
#ToyFail
GOTO Copenhagen 2018
49:15
Security and Trust in a Microservices World
Security and Trust in a Microservices World
GOTO Chicago 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Copenhagen 2018
51:09
Cloud Native is about Culture, not Containers
Cloud Native is about Culture, not Containers
GOTO Copenhagen 2018
55:53
Ethereum Fundamentals
Ethereum Fundamentals
GOTO Berlin 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Berlin 2018
44:07
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
GOTO Copenhagen 2018
50:57
Insecure Transit - Microservice
Insecure Transit - Microservice
GOTO Berlin 2018
55:11
Royal Testing: Purple Teaming to Build & Secure Applications Better!
Royal Testing: Purple Teaming to Build & Secure Applications Better!
GOTO Chicago 2017
32:34
Automating Security & Compliance (for Fun & Profit)
Automating Security & Compliance (for Fun & Profit)
GOTO Chicago 2017
38:15
Internet of Targets
Internet of Targets
GOTO Copenhagen 2017
41:32
Keynote: The Current State of Automotive Security
Keynote: The Current State of Automotive Security
GOTO Amsterdam 2017
38:20
Security in the Delivery Pipeline
Security in the Delivery Pipeline
GOTO Amsterdam 2017
42:45
Secure Substrate: Building the Moby Whale
Secure Substrate: Building the Moby Whale
GOTO Copenhagen 2017
38:15
Internet of Targets
Internet of Targets
GOTO Amsterdam 2018
41:21
Putting Your Security on the Wire
Putting Your Security on the Wire
GOTO Copenhagen 2018
42:54
Containers From Scratch
Containers From Scratch
GOTO Amsterdam 2018
42:20
Securing APIs and Microservices with OAuth and OpenID Connect
Securing APIs and Microservices with OAuth and OpenID Connect
GOTO Copenhagen 2018
54:36
Confusion in the Land of the Serverless
Confusion in the Land of the Serverless
GOTO Amsterdam 2018
52:42
Let's all just agree: Achieving consensus in Blockchain-based systems
Let's all just agree: Achieving consensus in Blockchain-based systems
GOTO Berlin 2018
39:36
Common API Security Pitfalls
Common API Security Pitfalls
GOTO Amsterdam 2019
47:18
Introduction to OAuth 2.0 and OpenID Connect
Introduction to OAuth 2.0 and OpenID Connect
GOTO Berlin 2018
51:58
Principles for Developing More Secure Systems
Principles for Developing More Secure Systems
GOTO Chicago 2019
38:38
Content Security Policies: Let's Break Stuff
Content Security Policies: Let's Break Stuff
GOTO Copenhagen 2018
43:37
SSL/TLS for Mortals
SSL/TLS for Mortals
GOTO Berlin 2018
33:00
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
GOTO Chicago 2019
51:30
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Chicago 2019
44:19
Securing the JVM
Securing the JVM
GOTO Berlin 2018
38:38
Content Security Policies: Let's Break Stuff
Content Security Policies: Let's Break Stuff
GOTO Amsterdam 2019
44:19
Securing the JVM
Securing the JVM
GOTO Chicago 2019
18:45
OAuth and OpenID Connect in Plain English
OAuth and OpenID Connect in Plain English
GOTO Chicago 2020
44:39
Building Secure React Applications [VIRTUAL]
Building Secure React Applications [VIRTUAL]
GOTO Oslo 2020
17:58
Practical End-to-End Container Security at Scale
Practical End-to-End Container Security at Scale
GOTO Chicago 2020
44:39
Building Secure React Applications
Building Secure React Applications
GOTO Berlin 2019
43:21
Spring Cloud Gateway: Resilience and Security
Spring Cloud Gateway: Resilience and Security
GOTO Copenhagen 2021
25:56
Machine Learning Security Operations at One of the World's Largest Brewing Companies
Machine Learning Security Operations at One of the World's Largest Brewing Companies
GOTO Amsterdam 2022
31:35
Adapting DevOps in a World of Growing Software Supply Chain Attacks
Adapting DevOps in a World of Growing Software Supply Chain Attacks
GOTO Copenhagen 2021
32:26
Practical Tips and Tricks for CI/CD Success
Practical Tips and Tricks for CI/CD Success
GOTO Amsterdam 2022
37:37
Static Code Analysis - A Behind-the-scenes Look
Static Code Analysis - A Behind-the-scenes Look
GOTO Amsterdam 2022
41:44
Beyond Passwords: How WebAuthn Actually Works
Beyond Passwords: How WebAuthn Actually Works
GOTO Amsterdam 2023
33:29
Building Images For The Secure Supply Chain
Building Images For The Secure Supply Chain
GOTO Amsterdam 2023
59:52
The One Where We Threat Model During Development
The One Where We Threat Model During Development
GOTO Amsterdam 2023
42:36
Security By Design
Security By Design
GOTO Amsterdam 2023
45:22
Catching Commits to Secure Infrastructure as Code
Catching Commits to Secure Infrastructure as Code
GOTO Chicago 2023
42:01
Privacy, Crime, National Security, Human Rights & You in the Middle
Privacy, Crime, National Security, Human Rights & You in the Middle
GOTO Amsterdam 2023
49:59
One Does Not Simply Add MFA
One Does Not Simply Add MFA
YOW! Brisbane 2022
49:59
One Does Not Simply Add MFA
One Does Not Simply Add MFA
YOW! Melbourne 2022
49:59
One Does Not Simply Add MFA
One Does Not Simply Add MFA
YOW! Sydney 2022
55:12
GitHub Advanced Security: Helping Developers Secure the World’s Software
GitHub Advanced Security: Helping Developers Secure the World’s Software
GOTO Copenhagen 2023
43:49
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
GOTO Unscripted
44:54
The State of Application Security 2023: Learnings from 4 Million Scanned Services
The State of Application Security 2023: Learnings from 4 Million Scanned Services
GOTO Copenhagen 2023
33:05
Using IAST to Unlock the Benefits of DevSecOps
Using IAST to Unlock the Benefits of DevSecOps
YOW! London 2022
49:52
Building Layers of Defense with Spring Security
Building Layers of Defense with Spring Security
GOTO Amsterdam 2017
28:20
HORRORLARITY
HORRORLARITY
GOTO Berlin 2019
42:22
Think like a Hacker
Think like a Hacker
GOTO Berlin 2019
44:09
Building a Self-driving RC Car
Building a Self-driving RC Car
GOTO Berlin 2019
57:32
The Evolution of Threat Models for Secure Communication Products
The Evolution of Threat Models for Secure Communication Products
GOTO Amsterdam 2018
33:08
An Insider's Guide to Cloud Computing
An Insider's Guide to Cloud Computing
GOTO Book Club
50:36
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail: Is your Child Safe from the Internet of Things?
GOTO Berlin 2018
50:36
#ToyFail
#ToyFail
GOTO Copenhagen 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Copenhagen 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Berlin 2018
36:54
Privacy in Software
Privacy in Software
GOTO Copenhagen 2017
41:41
Keynote: Surveillance & Cryptography
Keynote: Surveillance & Cryptography
GOTO Amsterdam 2017
41:21
Putting Your Security on the Wire
Putting Your Security on the Wire
GOTO Copenhagen 2018
50:36
#ToyFail
#ToyFail
GOTO Amsterdam 2018
33:07
Practical Data Privacy
Practical Data Privacy
GOTO Amsterdam 2023
51:30
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Chicago 2019
41:44
Beyond Passwords: How WebAuthn Actually Works
Beyond Passwords: How WebAuthn Actually Works
GOTO Amsterdam 2023
40:45
Creating Local-First Collaboration Software with Automerge
Creating Local-First Collaboration Software with Automerge
GOTO Amsterdam 2023
51:30
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Chicago 2019
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Copenhagen 2018
24:57
Hacking the Internet of Things for Fun & Profit
Hacking the Internet of Things for Fun & Profit
GOTO Amsterdam 2017
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Berlin 2018
44:54
The State of Application Security 2023: Learnings from 4 Million Scanned Services
The State of Application Security 2023: Learnings from 4 Million Scanned Services
GOTO Copenhagen 2023
24:57
Hacking the Internet of Things for Fun & Profit
Hacking the Internet of Things for Fun & Profit
GOTO Amsterdam 2017
50:26
Code as Risk
Code as Risk
GOTO Amsterdam 2017
48:38
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
GOTO Copenhagen 2023
51:04
A Practical Guide to Cybercrime
A Practical Guide to Cybercrime
GOTO Copenhagen 2019
41:58
The Future of Security
The Future of Security
GOTO Copenhagen 2019
AI-Powered Bug Hunting
AI-Powered Bug Hunting
GOTO Chicago 2024
41:32
Keynote: The Current State of Automotive Security
Keynote: The Current State of Automotive Security
GOTO Amsterdam 2017
47:47
Sandworm Q&A
Sandworm Q&A
GOTO Copenhagen 2023
42:48
How The Hack?
How The Hack?
GOTO Amsterdam 2023
24:57
Hacking the Internet of Things for Fun & Profit
Hacking the Internet of Things for Fun & Profit
GOTO Amsterdam 2017
59:52
The One Where We Threat Model During Development
The One Where We Threat Model During Development
GOTO Amsterdam 2023
57:32
The Evolution of Threat Models for Secure Communication Products
The Evolution of Threat Models for Secure Communication Products
GOTO Amsterdam 2018
38:44
Competence Development Through Capture the Flag and Virtual Hacker Labs
Competence Development Through Capture the Flag and Virtual Hacker Labs
GOTO Aarhus 2023
16:26
Advanced OAuth and Pitfalls
51:18
Security Chaos Engineering
Maarten Everts

Maarten Everts

from

Linksight MPC

CTO & co-founder Linksight

Eoin Woods

Eoin Woods

from

Endava

Chief Engineer of Endava, co-author of three software architecture books

Christine Seeman

Christine Seeman

from

WP Engine

Senior Software Engineer, WP Engine

Scott Helme

Scott Helme

Security researcher, hacker, founder of Report URI & Security Headers

Darren Richardson

Darren Richardson

from

Eficode

Cybersecurity specialist

Eleanor Saitta

Eleanor Saitta

from

International security and ...

Consulting CISO and Security Architect

Rob Bos

Rob Bos

from

Xpirit

Continuously improving with DevOps

Sebastian Brandes

Sebastian Brandes

from

F5

Sr. Principal Product Manager at F5

Suz Hinton

Suz Hinton

Software Engineer

Josh Armitage

Josh Armitage

from

Cognizant Servian

Senior Engagement Partner at Cognizant Servian

Katharine Jarmul

Katharine Jarmul

from

Thoughtworks

Principal Data Scientist at Thoughtworks & O'Reilly Author

Alyona  Galyeva

Alyona Galyeva

from

Thoughtworks

Principal MLOps & Data Engineer at Thoughtworks

Bert Hubert

Bert Hubert

Entrepreneur

Andy Greenberg

Andy Greenberg

from

WIRED Magazine

Author of "Sandworm" and "Tracers in the Dark". Writes about security, privacy, information freedom, and hacker culture.

Izar Tarandach

Izar Tarandach

from

Datadog

Sr. Staff Engineer at Datadog

Browse all tags

Here