filmov
tv
Все публикации
0:25:29
Defending Against Path Traversal Attacks
0:58:37
Evolution of SIEM in the Cloud
1:07:15
Centralizing Cloud Logs and Events with Microsoft Sentinel
0:23:21
Operating System Command Injection
0:31:38
HANDS-ON WORKSHOP: Prevent Remote Code Executions with Private Endpoints: Aviata Chapter 2
0:15:26
Preventing SQL Injection in Python
0:46:25
JWTs The Good, the Bad, and the Ugly Security Edition
0:15:34
Secure Service Configuration Poster Resource Demo
0:59:07
Cloud Flight Simulator Part 4: Least Privileged Pods with Kubernetes Workloads
0:56:40
Cloud Flight Simulator Part 1: GitLab CI, Workflows, and Secrets
0:53:17
2024 Cloud Security Trends and Predictions
0:58:18
Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox | Season 2 Ep9
0:02:45
Get to Know Brandon Evans, SANS Certified Instructor, Lead Author of SANS SEC510
0:29:54
How Ramp Manages Authorization in the Cloud and Achieves Least Privilege
0:33:40
Practical Security Monitoring and Response in Microsoft Azure
0:30:50
Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform
0:29:31
Real World Lessons Learned from 18 months of CIEM implementations in the Enterprise
0:30:07
Detective Controls in K8s Environments – Wrangling Security Data Out Of Your Clusters
0:30:51
Cloud Security: What Works and What Doesn't
0:39:19
Keynote | Go Beyond Gatekeeping: A Systems Design Approach to Security Engineering
0:31:29
Modernizing Cloud Vulnerability Management with Serverless, Containers, and IaC
0:20:54
Scaling Identity & Access in Multi-Account Enterprises: Complexities & Strategies for Effective IAM
0:35:33
Top 10 Azure Security Tips From 10 Years of Securing Azure Applications
0:35:48
Policy as Code: strengthening governance and security in cloud infrastructure
Вперёд