
Sign up to save your podcasts
Or
Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136
4.8
44 ratings
Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136
7,898 Listeners
365 Listeners
626 Listeners
366 Listeners
265 Listeners
1,009 Listeners
7,879 Listeners
166 Listeners
181 Listeners
314 Listeners
74 Listeners
58 Listeners
127 Listeners
38 Listeners
43 Listeners