
Sign up to save your podcasts
Or
1. Threat matrix for Kubernetes
The application of the ATT&CK methodology to Kubernetes is the subject matter that everyone using Kubernetes should know.
2. 5 Objectives for Establishing an API-First Security Strategy
The five objectives are a good reminder that when using API (and we all are), think security first.
3. Izar Tarandach and Matt Coles-- Threat Modeling: A Practical Guide for Development Teams
Threat model all the things!
4. Deep dive in CORS: History, how it works, and best practices
Put in the work to enable CORS for your web applications.
5. NSA: Top 5 vulnerabilities actively abused by Russian govt hackers
Application security is more than just the application. We must build a strong foundation across all the other layers of our system.
1. Threat matrix for Kubernetes
The application of the ATT&CK methodology to Kubernetes is the subject matter that everyone using Kubernetes should know.
2. 5 Objectives for Establishing an API-First Security Strategy
The five objectives are a good reminder that when using API (and we all are), think security first.
3. Izar Tarandach and Matt Coles-- Threat Modeling: A Practical Guide for Development Teams
Threat model all the things!
4. Deep dive in CORS: History, how it works, and best practices
Put in the work to enable CORS for your web applications.
5. NSA: Top 5 vulnerabilities actively abused by Russian govt hackers
Application security is more than just the application. We must build a strong foundation across all the other layers of our system.