
Sign up to save your podcasts
Or
1. I Mailed an AirTag and Tracked Its Progress; Here’s What Happened
AirTags use the network capacity of all other Apple devices. If you own an Apple device, you’re now part of a mesh network that you cannot disable.
2. The Need to Protect Public AWS SSM Documents – What the Research Shows
Follow the AWS Best Practices for SSM: https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-before-you-share.html
3. Application Security and the Zen of Python
Application security and the Zen of Python are complementary of each other. All languages can have security applied.
4. More Companies Adopting DevOps & Agile for Security
We saw DevOps & Agile Security move forward in the past year, but we have more room to grow.
5. Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys
Hardcoded keys should NEVER be embedded in any type of app.
1. I Mailed an AirTag and Tracked Its Progress; Here’s What Happened
AirTags use the network capacity of all other Apple devices. If you own an Apple device, you’re now part of a mesh network that you cannot disable.
2. The Need to Protect Public AWS SSM Documents – What the Research Shows
Follow the AWS Best Practices for SSM: https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-before-you-share.html
3. Application Security and the Zen of Python
Application security and the Zen of Python are complementary of each other. All languages can have security applied.
4. More Companies Adopting DevOps & Agile for Security
We saw DevOps & Agile Security move forward in the past year, but we have more room to grow.
5. Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys
Hardcoded keys should NEVER be embedded in any type of app.