
Sign up to save your podcasts
Or


Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136
By Security Weekly Productions4.8
44 ratings
Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw136

7,722 Listeners

371 Listeners

266 Listeners

374 Listeners

638 Listeners

1,021 Listeners

8,016 Listeners

178 Listeners

181 Listeners

314 Listeners

74 Listeners

57 Listeners

137 Listeners

40 Listeners

46 Listeners