IN
All
Articles
Books
Experts
Videos

cyber security

153 RESULTS
Application Security: Inside Out
Application Security: Inside Out
GOTO Amsterdam 2023
Does Agile Make Us Less Secure?
Does Agile Make Us Less Secure?
GOTO Copenhagen 2019
A Practical Guide to Cybercrime
A Practical Guide to Cybercrime
OAuth Tokens As Your Identity API
OAuth Tokens As Your Identity API
Mapping CI/CD Attack Surfaces
Mapping CI/CD Attack Surfaces
Crafting Robust Architectures for a Resilient Future
Crafting Robust Architectures for a Resilient Future
Lessons From Billions of Breached Records [Live Streamed]
Lessons From Billions of Breached Records [Live Streamed]
Concurrency Abstractions for Application Security
Concurrency Abstractions for Application Security
Protect Your Code with GitHub Security Features
Protect Your Code with GitHub Security Features
Competence Development Through Capture the Flag and Virtual Hacker Labs
Competence Development Through Capture the Flag and Virtual Hacker Labs
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
GOTO Aarhus 2023
Shaping Language in Cybersecurity For People
Shaping Language in Cybersecurity For People
GOTO Aarhus 2023
Principles For Secure and Reliable Systems
Principles For Secure and Reliable Systems
GOTO Aarhus 2023
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Sandworm Q&A
Sandworm Q&A
It’s a Kind of Magic: Computation on Ciphertexts
It’s a Kind of Magic: Computation on Ciphertexts
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail
#ToyFail
Security and Trust in a Microservices World
Security and Trust in a Microservices World
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
Cloud Native is about Culture, not Containers
Cloud Native is about Culture, not Containers
Ethereum Fundamentals
Ethereum Fundamentals
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
Royal Testing: Purple Teaming to Build & Secure Applications Better!
Royal Testing: Purple Teaming to Build & Secure Applications Better!
Automating Security & Compliance (for Fun & Profit)
Automating Security & Compliance (for Fun & Profit)
Internet of Targets
Internet of Targets
GOTO Copenhagen 2017
Keynote: The Current State of Automotive Security
Keynote: The Current State of Automotive Security
Security in the Delivery Pipeline
Security in the Delivery Pipeline
Secure Substrate: Building the Moby Whale
Secure Substrate: Building the Moby Whale
Internet of Targets
Internet of Targets
GOTO Amsterdam 2018
Putting Your Security on the Wire
Putting Your Security on the Wire
GOTO Copenhagen 2018
Containers From Scratch
Containers From Scratch
Securing APIs and Microservices with OAuth and OpenID Connect
Securing APIs and Microservices with OAuth and OpenID Connect
Confusion in the Land of the Serverless
Confusion in the Land of the Serverless
Let's all just agree: Achieving consensus in Blockchain-based systems
Let's all just agree: Achieving consensus in Blockchain-based systems
Common API Security Pitfalls
Common API Security Pitfalls
GOTO Amsterdam 2019
Introduction to OAuth 2.0 and OpenID Connect
Introduction to OAuth 2.0 and OpenID Connect
Principles for Developing More Secure Systems
Principles for Developing More Secure Systems
Content Security Policies: Let's Break Stuff
Content Security Policies: Let's Break Stuff
GOTO Copenhagen 2018
SSL/TLS for Mortals
SSL/TLS for Mortals
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
Content Security Policies: Let's Break Stuff
Content Security Policies: Let's Break Stuff
Securing the JVM
Securing the JVM
OAuth and OpenID Connect in Plain English
OAuth and OpenID Connect in Plain English
Building Secure React Applications [VIRTUAL]
Building Secure React Applications [VIRTUAL]
GOTO Oslo 2020
Practical End-to-End Container Security at Scale
Practical End-to-End Container Security at Scale
Building Secure React Applications
Building Secure React Applications
Spring Cloud Gateway: Resilience and Security
Spring Cloud Gateway: Resilience and Security
GOTO Copenhagen 2021
Machine Learning Security Operations at One of the World's Largest Brewing Companies
Machine Learning Security Operations at One of the World's Largest Brewing Companies
GOTO Amsterdam 2022
Adapting DevOps in a World of Growing Software Supply Chain Attacks
Adapting DevOps in a World of Growing Software Supply Chain Attacks
GOTO Copenhagen 2021
Practical Tips and Tricks for CI/CD Success
Practical Tips and Tricks for CI/CD Success
Static Code Analysis - A Behind-the-scenes Look
Static Code Analysis - A Behind-the-scenes Look
Beyond Passwords: How WebAuthn Actually Works
Beyond Passwords: How WebAuthn Actually Works
GOTO Amsterdam 2023
Building Images For The Secure Supply Chain
Building Images For The Secure Supply Chain
The One Where We Threat Model During Development
The One Where We Threat Model During Development
Security By Design
Security By Design
GOTO Amsterdam 2023
Catching Commits to Secure Infrastructure as Code
Catching Commits to Secure Infrastructure as Code
GOTO Chicago 2023
Privacy, Crime, National Security, Human Rights & You in the Middle
Privacy, Crime, National Security, Human Rights & You in the Middle
GOTO Amsterdam 2023
One Does Not Simply Add MFA
One Does Not Simply Add MFA
YOW! Brisbane 2022
One Does Not Simply Add MFA
One Does Not Simply Add MFA
YOW! Melbourne 2022
One Does Not Simply Add MFA
One Does Not Simply Add MFA
YOW! Sydney 2022
GitHub Advanced Security: Helping Developers Secure the World’s Software
GitHub Advanced Security: Helping Developers Secure the World’s Software
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
The State of Application Security 2023: Learnings from 4 Million Scanned Services
The State of Application Security 2023: Learnings from 4 Million Scanned Services
Using IAST to Unlock the Benefits of DevSecOps
Using IAST to Unlock the Benefits of DevSecOps
Building Layers of Defense with Spring Security
Building Layers of Defense with Spring Security
HORRORLARITY
HORRORLARITY
Think like a Hacker
Think like a Hacker
GOTO Berlin 2019
Building a Self-driving RC Car
Building a Self-driving RC Car
The Evolution of Threat Models for Secure Communication Products
The Evolution of Threat Models for Secure Communication Products
Putting Your Security on the Wire
Putting Your Security on the Wire
GOTO Copenhagen 2018
Practical Data Privacy
Practical Data Privacy
GOTO Amsterdam 2023
#ToyFail
#ToyFail
GOTO Amsterdam 2018
#ToyFail
#ToyFail
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
Privacy in Software
Privacy in Software
GOTO Copenhagen 2017
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
#ToyFail: Is your Child Safe from the Internet of Things?
#ToyFail: Is your Child Safe from the Internet of Things?
Keynote: Surveillance & Cryptography
Keynote: Surveillance & Cryptography
Creating Local-First Collaboration Software with Automerge
Creating Local-First Collaboration Software with Automerge
GOTO Amsterdam 2023
Beyond Passwords: How WebAuthn Actually Works
Beyond Passwords: How WebAuthn Actually Works
GOTO Amsterdam 2023
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
The State of Application Security 2023: Learnings from 4 Million Scanned Services
The State of Application Security 2023: Learnings from 4 Million Scanned Services
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
Hacking the Internet of Things for Fun & Profit
Hacking the Internet of Things for Fun & Profit
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
Code as Risk
Code as Risk
Hacking the Internet of Things for Fun & Profit
Hacking the Internet of Things for Fun & Profit
Sandworm Q&A
Sandworm Q&A
Hacking the Internet of Things for Fun & Profit
Hacking the Internet of Things for Fun & Profit
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
A Practical Guide to Cybercrime
A Practical Guide to Cybercrime
Keynote: The Current State of Automotive Security
Keynote: The Current State of Automotive Security
How The Hack?
How The Hack?
GOTO Amsterdam 2023
The Evolution of Threat Models for Secure Communication Products
The Evolution of Threat Models for Secure Communication Products
The One Where We Threat Model During Development
The One Where We Threat Model During Development
Competence Development Through Capture the Flag and Virtual Hacker Labs
Competence Development Through Capture the Flag and Virtual Hacker Labs
Browse all tags
Here