cotalks.dev
Login
Security & Privacy
Videos
1 — GOTO 2020 • Live Hacking Session Part 2 • Scott Helme
2 — GOTO 2020 • Cloud Native Communication Patterns with gRPC • Kasun Indrasiri
3 — GOTO 2020 • Q2 - Is All Executable Code Added to a Container Image at Build Time? • Liz Rice
4 — GOTO 2020 • Q3 - Are you Avoiding --privileged? • Liz Rice
5 — GOTO 2020 • Live Hacking Session Part 1 • Scott Helme
6 — GOTO 2020 • Q6 - Can You Prevent Container Drift? • Liz Rice
7 — GOTO 2020 • Q5 - Are Your Secrets Encrypted at Rest and in Transit? • Liz Rice
8 — GOTO 2020 • OAuth and OpenID Connect in Plain English • Nate Barbettini
9 — GOTO 2020 • How to Hack OAuth • Aaron Parecki
10 — GOTO 2019 • AppSec: From the OWASP Top Ten(s) to the OWASP ASVS • Jim Manico
11 — GOTO 2020 • Advanced OAuth and Pitfalls • Aaron Parecki & Eric Johnson
12 — GOTO 2020 • The Secrets of OAuth 2.0 • Aaron Parecki & Eric Johnson
13 — GOTO 2020 • PKCE Grant Type in OAuth & How to Use it (Teaser) • Aaron Parecki & Eric Johnson
14 — GOTO 2019 • The Future of Security • Zoë Rose
15 — GOTO 2019 • How to Build a Self-driving RC Car • Bert Jan Schrijver
16 — GOTO 2019 • Taking Security Seriously • Michael Brunton-Spall
17 — GOTO 2019 • HORRORLARITY • Leif Nixon
18 — GOTO 2019 • Think like a Hacker • Matt Brunt
19 — GOTO 2019 • Common API Security Pitfalls • Philippe De Ryck
20 — GOTO 2019 • Securing the JVM • Nicolas Frankel
21 — GOTO 2020 • Q1 - Are Your Builds Running Separately from Your Production Cluster? • Liz Rice
22 — GOTO 2015 • How to Effect Change in the Epistemological Wasteland of App Security • James Wickett
23 — GOTO 2014 • Privacy & Security, Policy & Technology • Tim Bray
24 — GOTO 2017 • Privacy in Software • Emma Arfelt
25 — GOTO 2017 • Internet of Targets • Leif Nixon
26 — GOTO 2017 • Royal Testing: Purple Teaming to Build & Secure Applications Better! • Kevin Johnson
27 — GOTO 2017 • Automating Security & Compliance (for Fun & Profit) • Nicole Johnson
28 — GOTO 2017 • Surveillance & Cryptography • Jaya Baloo
29 — GOTO 2017 • The Current State of Automotive Security • Chris Valasek
30 — GOTO 2017 • Code as Risk • Kevlin Henney
31 — GOTO 2017 • Hacking the Internet of Things for Fun & Profit • Ruben van Vreeland
32 — GOTO 2016 • Securing IoT Connected Device Applications • Ian Massingham
33 — GOTO 2016 • Secure by Design – the Architect's Guide to Security Design Principles • Eoin Woods
34 — GOTO 2016 • Modding Security & Privacy • Barry Galster
35 — GOTO 2015 • Insights in Container Security • Nils Magnus
36 — GOTO 2016 • Docker Security • Adrian Mouat
37 — GOTO 2016 • Cryptography Pitfalls • John Downey
38 — GOTO 2016 • Practical Microservice Security • Laura Bell
39 — GOTO 2015 • How We Hacked LinkedIn & What Happened Next • Ruben van Vreeland
40 — GOTO 2015 • The Android Security Jungle: Pitfalls, Threats & Survival Tips • Scott Alexander Bown
41 — GOTO 2016 • Secure Coding Patterns • Andreas Hallberg
42 — GOTO 2016 • Container & Microservice Security • Adrian Mouat
43 — GOTO 2016 • Secure Socks: Exploring Microservice Security in an Open Source Sock Shop • Phil Winder
44 — GOTO 2017 • Building Layers of Defense with Spring Security • Joris Kuipers
45 — GOTO 2017 • Security in the Delivery Pipeline • James Wickett
46 — GOTO 2019 • Principles for Developing More Secure Systems • Eleanor Saitta
47 — GOTO 2016 • Rugged: Being Secure & Agile • Michael Brunton-Spall
48 — GOTO 2019 • Does Agile Make Us Less Secure? • Michael Brunton-Spall
49 — GOTO 2020 • 2FA in 2020 and Beyond • Kelley Robinson
50 — GOTO 2020 • Practical End-to-End Container Security at Scale • Yashvier Kosaraju
51 — GOTO 2020 • Q4 - Are You Keeping Hosts Up to Date with the Latest Security Releases? • Liz Rice
52 — GOTO 2019 • OAuth Tokens As Your Identity API • Jacob Ideskog