
Sign up to save your podcasts
Or
1. Jeevan Singh -- Threat modeling based in democracy
Jeevan joins us to speak about self-serve threat modeling at Segment or threat modeling based in democracy.
2. joswha/Secure-Coding-Handbook
Client side, Server Side, Auxiliary.
3. Security headers quick reference
Security headers recommended for all websites, websites that handle sensitive user data, and websites with advanced capabilities.
4. Cyber insurance isn't helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers
The paper suggests that insurance should require 'minimum ransomware controls' as part of any ransomware coverage.
5. Microsoft Refining Third-Party Driver Vetting Processes After Signing Malicious Rootkit
If you sign something malicious, you allow it to bypass all your other security controls.
1. Jeevan Singh -- Threat modeling based in democracy
Jeevan joins us to speak about self-serve threat modeling at Segment or threat modeling based in democracy.
2. joswha/Secure-Coding-Handbook
Client side, Server Side, Auxiliary.
3. Security headers quick reference
Security headers recommended for all websites, websites that handle sensitive user data, and websites with advanced capabilities.
4. Cyber insurance isn't helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers
The paper suggests that insurance should require 'minimum ransomware controls' as part of any ransomware coverage.
5. Microsoft Refining Third-Party Driver Vetting Processes After Signing Malicious Rootkit
If you sign something malicious, you allow it to bypass all your other security controls.