
Sign up to save your podcasts
Or
Commentary: Security culture continues to grow as a non-negotiable piece of a security strategy.
Commentary: Safe list input validation is always our go to, but the big list of naughty strings is a nice input for testing!
Commentary: jQuery is still widely in use across the web, and adopting trusted types is a strong security step forward.
Commentary: Software and data integrity failures are the root cause of many supply chain debacles in the past few y
Commentary: We often think of patching as a security problem that has been solved – patching is always challenging!
Commentary: Security culture continues to grow as a non-negotiable piece of a security strategy.
Commentary: Safe list input validation is always our go to, but the big list of naughty strings is a nice input for testing!
Commentary: jQuery is still widely in use across the web, and adopting trusted types is a strong security step forward.
Commentary: Software and data integrity failures are the root cause of many supply chain debacles in the past few y
Commentary: We often think of patching as a security problem that has been solved – patching is always challenging!