
Sign up to save your podcasts
Or


Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136
By Security Weekly Productions4.8
44 ratings
Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136

7,595 Listeners

372 Listeners

268 Listeners

372 Listeners

651 Listeners

1,020 Listeners

8,066 Listeners

179 Listeners

180 Listeners

315 Listeners

74 Listeners

57 Listeners

139 Listeners

40 Listeners

44 Listeners