
Sign up to save your podcasts
Or


Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136
By Security Weekly Productions4.7
3535 ratings
Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136

2,005 Listeners

83 Listeners

652 Listeners

101 Listeners

1,027 Listeners

33 Listeners

28,462 Listeners

187 Listeners

139 Listeners

26,686 Listeners