Software Security
Showing 8 out of 8 results
Should We Be on the Lookout for OAuth 3.0?
OAuth.net recently shared details around the ongoing effort to create a next-generation protocol based on years of knowledge and experience with OAuth 2. Find out what this means and how you can get involved.

Expert Talk: Software Security
Security is a key topic in software. Lately, it has shifted from a security team responsibility to a task every single developer has to think about. Jim Manico, Founder and Secure Coding Educator at Manicode Security, and John Steven, the Founding Principal at Aedify Security, assess the evolution of the security role in order for developers to make the right decisions.

Bridging Cybersecurity: Detectify
The current events of COVID19 and the conflict in Europe have raised the stakes for cyber attacks. Jørn Larsen, the CEO of Trifork, talks with Rickard Carlsson, the CEO of Detectify, about trends in cybersecurity and how Detectify is leading the way. They discuss Detectify’s approach to fighting cybercrime and the impact of cryptocurrencies, war, and pandemic on cyberattacks.

The Current State of Cyber Security
It’s almost a given that you or your company will be hacked one day. How fast and how you react is the thing that makes the difference. Eleanor Saitta explains the ins and outs of an attack and what you should have in place to surpass it successfully.

Expert Talk: Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More!
Join us for an engaging conversation between Ben Sadegiphour, VP of Research at Hadrian Security, and Julian Wood, Developer Advocate at AWS. In this conversation, we will explore a range of captivating topics, such as: Bug bounties, ethical hacking, Skills, Resources, tips and much more. Whether you're an aspiring ethical hacker or simply interested in the fascinating world of cybersecurity, this video is packed with knowledge and practical advice. Get ready to hack like a pro, learn how you can convert bug bounty hunting into a passive income while you sleep and join us on this exciting journey to make the online world a safer place!

Advanced OAuth and Pitfalls
Deep dive into some advanced OAuth 2.0 processes and pitfalls like redirect URLs and STATE property.

Understanding the Secrets of OAuth 2.0 with Aaron Parecki
Learn the secrets of building a secure web application by using OAuth 2.0. The framework has already become an industry standard. Aaron Parecki, author of the book "OAuth 2.0 Simplified,” guides you through some of the main reasons to use the framework and what it takes to build a secure web server.

Security Chaos Engineering
What’s the state of the art in modern security practices? The authors of the book Security Chaos Engineering, Aaron Rinehart and Kelly Shortridge talk to Mark Mille about the shift in the mental model that one has to undertake to reap its benefits. Their approach paves a new way that allows security engineers to uncover bugs in complex systems by chaos experiments before an actual attack.
