
Sign up to save your podcasts
Or
1. Impact of GDPR on Cloud Service Providers
Privacy is here to stay -- long live data privacy in the cloud.
2. Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
Bug bounty hunter techniques are the same techniques adversaries use.
3. What Every Incident Response Plan Needs
Nobody thinks they’ll need an incident response plan… until it’s too late.
4. Dev-Sec Disconnect Undermines Secure Coding Efforts
Developer empathy – as a security person, walk a mile in the shoes of your developers. It will change your whole perspective.
5. Look how many cybercriminals love Cobalt Strike
Adversaries use the best tools available for any job. Sometimes those tools are the same tools used by those on the side of good.
1. Impact of GDPR on Cloud Service Providers
Privacy is here to stay -- long live data privacy in the cloud.
2. Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
Bug bounty hunter techniques are the same techniques adversaries use.
3. What Every Incident Response Plan Needs
Nobody thinks they’ll need an incident response plan… until it’s too late.
4. Dev-Sec Disconnect Undermines Secure Coding Efforts
Developer empathy – as a security person, walk a mile in the shoes of your developers. It will change your whole perspective.
5. Look how many cybercriminals love Cobalt Strike
Adversaries use the best tools available for any job. Sometimes those tools are the same tools used by those on the side of good.