Deserialization exploits in Java: why should I care?Conference - INTERMEDIATE LEVEL Brian VermeerSnyk More
Early Warning Systems: From the Ringing of Church Bells to Automated Malware DetectionConference - BEGINNER LEVEL Kadi GriggSonatype More
Hidden security features of the JVM - everything you didn’t know and moreConference - BEGINNER LEVEL Steve PooleSonatype More
OAUTH 2.1 explained simply (even if you are not a developer) !Conference - BEGINNER LEVEL Julien TopçuShodo More
The anatomy of supply chain attacks - practical lessons from recent breachesConference - INTERMEDIATE LEVEL Mackenie JacksonGitGuardian More
What does little frog have to do with cybersecurity? Or keeping your kids safe online (workshops)BOF - BEGINNER LEVEL Marta Fydrych-GąsowskaAkamai Technologies Grzegorz RożnieckiAkamai Technologies More
Why do we need security headers?Conference - INTERMEDIATE LEVEL Jacek MarmuszewskiLet's Go DevOps More
Early Warning Systems: From the Ringing of Church Bells to Automated Malware DetectionSimilarity score = 0.58 More
What does little frog have to do with cybersecurity? Or keeping your kids safe online (workshops)Similarity score = 0.59 More
Hidden security features of the JVM - everything you didn’t know and moreSimilarity score = 0.61 More