How to adapt the SDLC for DevSecOps Zane Lackey

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=_iwNme3SFmM



Category:
Guide
Duration: 55:04
1 views
0


Insomnihack 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2023-05-04Take or Buy Michael Hausding
2023-05-04Abusing Android In app Billing feature Jérémy Matos
2023-05-04Unboxing your virtualBox Niklas Baumstark
2023-05-04Attacking NET deserialization Alvaro Muñoz
2023-05-04Battle of the Smarts Hacking Smartphones with Bluetooth Smart Tal Melamed
2023-05-04Unmasking stealth operations using UBA super powers Snir Ben Shimol, Varonis
2023-05-04DPAPI and DPAPI NG Decrypting All Users’ Secrets and PFX Passwords Paula Januszkewicz
2023-05-04Email SPFoofing modern email security features and how to break them Roberto Clapis
2023-05-04GLibC Malloc for Exploiters Leak It, Write It, Become a Wizard Yannay Livneh
2023-05-04Hijacking the Boot Process, Ransomware Style Raul Alvarez, Fortinet
2023-05-04How to adapt the SDLC for DevSecOps Zane Lackey
2023-05-04Least privilege security architecture for virtualization and cloud Ghaleb Zekri, VMware
2023-05-04Maximize the power of hex rays decompiler Igor Kirillov
2023-05-04Travis Hartman Espionage and Data Extrication from High Security Environments
2023-05-04Capt G Mark Hardy USN, Ret Weaponizing Digital Currency
2023-05-04Dan Kuehl IO IW Education Two Decades of Successes and Failures
2023-05-04Georgia Weidman Exploiting BYOD for Network Infiltration
2023-05-04Jacob Loukkula Building WMDs at Costco for the Poor Man's Terrorist
2023-05-04Jorge Sebastio Middle East Cyberwar from a Middle Eastern Perspective
2023-05-04Patrick J Scribner Why IO Policy is Wrong for the Future
2023-05-04Paul Coggin Basic Persistent Threats to the Digital Energy Sector



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering