2022-05-11 | What is DevSecOps | 2:46 | 0 | |
|
2022-05-11 | DevSecCon London 2017 Highlights | 3:07 | 0 | |
|
2022-05-11 | Creating a graph based security organisation Dinis Cruz Keynote at DevSecCon London 2017 | 42:49 | 2 | |
|
2022-05-11 | Don’t panic Secure continuous delivery | 32:55 | 1 | |
|
2022-05-11 | DevOps, security, and compliance Working in unison | 32:31 | 1 | |
|
2022-05-11 | Automating OWASP ZAP | 58:01 | 9 | |
|
2022-05-11 | Application monitoring in the land of DevSecOps | 23:31 | 2 | |
|
2022-05-11 | Writing Secure Node Code | 34:35 | 9 | |
|
2022-05-11 | Writing firewall policies in app manifests | 21:07 | 0 | |
|
2022-05-11 | Static analysis for code and infrastructure | 22:01 | 0 | |
|
2022-05-11 | Security patching system packages is fun said no one ever | 24:32 | 0 | |
|
2022-05-11 | Security in the wild | 27:24 | 0 | |
|
2022-05-11 | Securely automating infrastructure in the Cloud | 17:43 | 0 | |
|
2022-05-11 | Off the shelf automation to find bugs, out the box thinking to find design flaws | 27:22 | 0 | |
|
2022-05-11 | Monitoring applications and infrastructure in AWS and Azure | 26:34 | 0 | |
|
2022-05-11 | Managing shared secrets with standard unix tools | 24:20 | 0 | |
|
2022-05-11 | How does a traditional security team cope with a move to DevOps | 19:11 | 0 | |
|
2022-05-11 | Epic battle DevOps vs Security | 30:45 | 1 | |
|
2022-05-11 | Shifting Left Embedding Security into the DevOps pipeline Mike D Kail DevSecCon Boston 2017 | 38:10 | 1 | |
|
2022-05-11 | Innovative R&D A True Enabler For Achieving Security Testing At Speed DevSecCon Boston 2017 | 42:02 | 0 | |
|
2022-05-11 | DevSecCon Boston 2017 Highlights | 2:03 | 2 | |
|
2022-05-11 | Why does Security matter for DevOps Caroline Wong DevSecCon Boston 2017 | 31:08 | 0 | |
|
2022-05-11 | Skype A hidden OSINT goldmine WhiteHatInspector | 26:58 | 32 | |
|
2022-05-11 | Preparing for the OSCP Without Any PenTesting Experience Drew Jones | 32:17 | 35 | |
|
2022-05-11 | Parting ways with Purdue The Effect of Industry 4 0 on ICS Security Architectures Michael McGinley | 33:22 | 0 | |
|
2022-05-11 | What to do About Motivated Intruders Luke Pajor | 26:20 | 0 | |
|
2022-05-11 | What it takes to be an Ethical Hacker A journey into a technical role Chloe Seaton | 25:54 | 0 | |
|
2022-05-11 | The Zero Trust Model Sarthak Taneja S4t4n1212 | 25:47 | 6 | |
|
2022-05-11 | Systematic OSINT and the OSINTFUNdamentals BOsintBlanc | 29:26 | 16 | |
|
2022-05-11 | Smart phone to medical device in five not so easy steps Josephine Windsor Lewis | 29:40 | 6 | |
|
2022-05-09 | Honey, I shrunk the disks A beginner's guide to data recovery Abby Simmons | 25:22 | 12 | Guide |
|
2022-05-09 | Cyber Investigation OSINT of Phishing Emails Patrick Rus | 28:15 | 24 | |
|
2022-05-09 | Common Tools & Techniques Used By Threat Actors and Malware Nasreddine Bencherchali | 23:40 | 6 | |
|
2022-05-09 | Closing Remarks D OVERCON 2021 | 4:57 | 0 | |
|
2022-05-09 | Capabilities That one vulnerability vector you don't realize exists 3t3rn4l P4r4d0x | 27:16 | 1 | |
|
2022-05-09 | Building an effective Red Team Tehreem Fahim | 23:47 | 3 | |
|
2022-05-09 | Application Logic Vulnerabilities and My Journey Suryansh M 0xd4rk | 18:05 | 3 | Vlog |
|
2022-05-09 | All Your Modules Are Belong To Us An Introduction to Python Module Hijacking Sam Ferguson | 28:46 | 2 | |
|
2022-05-09 | A I The Inevitable Threat Luna Belfort & Alvaro Leno | 29:04 | 6 | |
|
2022-05-09 | A rookie journey into OSINT How to get started on a budget Juan Giarrizzo | 35:02 | 4 | Guide |
|
2022-05-09 | 0 Days & Nat 20's CVSSv3 Through the Lens of Dungeons & Dragons Alex Hoffman RedWedgeX | 26:32 | 0 | |
|
2022-05-09 | Moving forward in cybersecurity , with Vivian Band, Juan Spinel, Elizabeth Momola and James Bore | 31:49 | 1 | |
|
2022-05-09 | Making sense of data with Linux ArgandoV | 27:54 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Michel Quiroz Into the unknown From a stay at home parent to an | 23:51 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Laura Johnson Cyber Harassment Things I wish I knew when sh1t went | 44:49 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Kiran Oliver Breaking Down Barriers to InfoSec for Neurodivergent | 20:46 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Megan Carney How to sink the ducky and other tricks | 49:01 | 0 | Guide |
|
2022-05-09 | Diana Initiative 2020 Kelley Robinson What if we had TLS for Phone Numbers An introduction | 25:40 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Keenan Skelly It's a Human Thing Strategies for Navigating Diversity | 46:59 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Yolonda Smith What Does it Mean to Be a Barrier Breaker | 1:00:02 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Carlota Sage Low Tech & Insecure Building Better Boundaries at Work | 29:10 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Yasmine Johnston Ison I’m a hunter Cyber Intelligence the newish | 49:56 | 4 | |
|
2022-05-09 | Diana Initiative 2020 Xena Olsen CTI Mindset as a Technique for Blue Teamers | 25:11 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Juliet Okafor Reclaiming Your Space in Cyber Security Speak Out, Speak | 1:04:50 | 6 | |
|
2022-05-09 | Diana Initiative 2020 Bryson Bort & Keenan Skelly Entrepreneurial Adventures Starting Your | 1:13:14 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Jaswinder Kaur Moving Left in the SDLC | 23:46 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Will Baggett Broken Arrow | 48:25 | 2 | |
|
2022-05-09 | Diana Initiative 2020 Brianna Drummond & Laura Hernandez College Students Driving Digital | 42:47 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Jason Haddix The Bug Hunter’s Methodology v4 Reconnaissance | 1:16:54 | 36 | Vlog |
|
2022-05-09 | Diana Initiative 2020 Breanne Boland How an SRE became an application security engineer | 24:04 | 2 | |
|
2022-05-09 | Diana Initiative 2020 Bace 16 Secrets of the Second Factor | 42:41 | 5 | |
|
2022-05-09 | Diana Initiative 2020 Tracy Z Maleeff Empathy as a Service to Create a Culture of Security | 1:02:40 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Introduction to Capture the Flag CTF | 1:50:06 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Apurv Singh Gautam Automating Threat Hunting on the Dark Web and other | 52:27 | 14 | |
|
2022-05-09 | Diana Initiative 2020 Tracie Martin Getting Paid Like a Boss | 55:15 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Emily Crose So, I Made A Microdot | 53:17 | 4 | |
|
2022-05-09 | Diana Initiative 2020 Emily Cole My AWS Access Key Nightmares and Solutions | 24:17 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Amélie Koran & Nicole Schwartz Conference Submissions for the Faint of Hea | 27:51 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Taylor McCaslin Products People Trust Privacy, Consent, & Security | 52:03 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Amélie Koran DevSecOps It’s A Team Sport | 23:40 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Amanda Draeger Lessons Learned from Playing with String | 20:06 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Akanksha Chaturvedi & Nitya Garg Application Security OAuth 2 0 and | 36:51 | 3 | |
|
2022-05-09 | Diana Initiative 2020 Tanya Janca More than just pipelines DevSecOps | 49:29 | 3 | |
|
2022-05-09 | Diana Initiative 2020 Elizabeth Wharton & Suchismita Pahi Unmasking the Avengers Shifting | 51:38 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Aeva Black What I Learned About Bias From Crossing the Gender Divide | 22:02 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Aditi Bhatnagar Hacking into Android Ecosystem | 45:39 | 5 | |
|
2022-05-09 | Diana Initiative 2020 Tabitha Sable Kubernetes Workshop CTF Challenge Walkthrough | 1:14:07 | 9 | Walkthrough |
|
2022-05-09 | Diana Initiative 2020 Duane Dunston A case against Google it A cognitive science approach | 50:50 | 3 | |
|
2022-05-09 | Diana Initiative 2020 Chloe Messdaghi Bug Bounty Craze | 35:13 | 8 | |
|
2022-05-09 | Diana Initiative 2020 Danielle Knust No Mom, I’m not a Hacker | 19:54 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Sarah Clarke Testing all the things We can't catch 'em all and who's | 54:00 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Catherine J Ullman Incident Communications 101 Breaking the Bad News | 45:00 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Ria Baldevia BlueZ Cluez Getting to Know the Linux Bluetooth Protocol | 41:31 | 2 | |
|
2022-05-09 | Diana Initiative 2020 Meenakshi SL & Sandhra Bino Levelling up the Estrogen in the Cyber World | 48:54 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Perrine Farque 7 Tips for Women To Get To the Top in Technology | 16:05 | 1 | Vlog |
|
2022-05-09 | Diana Initiative 2020 Nicole Schwartz Closing Remarks | 10:48 | 2 | |
|
2022-05-09 | Diana Initiative 2020 Maggie MacAlpine Election Security 101 | 26:20 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Carlota Sage, Don Donzal, Ping Look, Sara Pickering Ch ch changes | 1:05:09 | 2 | |
|
2022-05-09 | Diana Initiative 2020 TechGirlMN Workshop 3 of 5 Off the Shelf Soldering addition | 2:05:55 | 0 | |
|
2022-05-09 | Diana Initiative 2020 TechGirlMN Workshop 2 of 5 Off the Shelf Breadboard addition | 1:23:35 | 0 | |
|
2022-05-09 | Diana Initiative 2020 TechGirlMN Workshop 1 of 5 Virtual badge building with tinkercad | 52:18 | 0 | |
|
2022-05-09 | Diana Initiative 2020 TechGirlMN Workshop 4 of 5 Basic Arduino coding using virtual Badge | 47:03 | 2 | |
|
2022-05-09 | Diana Initiative 2020 Abhijith B R abx Internal Red Team Operations Framework | 40:06 | 9 | |
|
2022-05-09 | Diana Initiative 2020 Abhijith B R abx Internal Red Team Operations Framework Building | 40:00 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Sreehari Haridas invisible Deploying discreet infrastructure for | 1:25:25 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Jaswinder Kaur Moving left in the SDLC | 23:41 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Godha Bapuji Critical Infrastructure, Interconnected Risks, and | 42:44 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Godha Bapuji Critical Infrastructure, Interconnected Risks, and Resiliency | 42:50 | 5 | |
|
2022-05-09 | Diana Initiative 2020 Arun S Offensive GraphQL API Exploitation | 57:25 | 5 | |
|
2022-05-09 | Diana Initiative 2020 Career Village Candidate Resume Tips | 9:02 | 0 | |
|