Solo was a smuggler, not a bounty hunter... just saying. <3 Good video.
@TheOnlyAndreySotnikovАй бұрын
This guy served in the elite Unit 8200, an Israeli Intelligence Corps unit responsible for clandestine operations, collecting signal intelligence (SIGINT) and code decryption, counterintelligence, cyber warfare, military intelligence, and surveillance. He is responsible for Meta's anti-Palestine bias and suppression of Palestinian voices.
@jakublesniak2637Ай бұрын
How do you set this up for i.e. dynamic feature branches? It's not realistic to expect that I would be able to add federated credentials for each branch from which I would like to start deploying?
@daxx238Ай бұрын
No application, all theory, useless.
@syk0saje2 ай бұрын
thanks for this, great talk! i disagree with this part, however: > Of course organizations want to have fewer incidents, however stating this as an end goal actually hurts our organizations. Indeed, it will lead to a reduction in incident count-not from actually reducing the number of incidents, but rather lessening how and how often they are reported. there's a way to avoid this if you do the prerequisite work of establishing psychological safety, valuing transparency, and a blameless culture.
@JoginderSingh-gr7fo2 ай бұрын
Good speach & good knolege Bachchi
@EvilGPT3 ай бұрын
This is really informative and I especially appreciated when you guys went over remediation steps. A lot of videos show how to but not how to stop it.
@winstonchurchill97214 ай бұрын
A Nuvem Snowflake
@cristianovisk4 ай бұрын
DEVSECCONBAHIA40 - AppSec na Pratica
@FullstackMac5 ай бұрын
Great video I love that there's value within the first 4 minutes
@bkkeats7 ай бұрын
Awesome work! Learned a lot.
@ulianalmeida80258 ай бұрын
Boa tarde!
@colandre808 ай бұрын
Molto interessante. Bravi!👏
@bonjony_8 ай бұрын
Parabéns! Adorei a proposta e conteúdo!
@GalexZ-8 ай бұрын
I listened on Audibles and it was excellent! Who is "They" and how does the "World End"? I get that we need to prevent vulnerability like Sweden & Japan have. Have we already lost our country to a Hacker War? Will awareness reverse the damage and gather more on board to protect information even after we created this mess?
@lucasfe343611 ай бұрын
Muito bom esse conteúdo. Estudei com o Rafael e muito legal ver hoje compartilhando experiências muito relevantes. Parabéns
@silentspectator123 Жыл бұрын
Please help me to understand the following. If the IP is whitelisted and SSL are in use. What is the use of using the Signing Algorithm? As the requests will be always from the verified provider. Other can't make a request due to IP whitelist in place.
@fredericohakamine3724 ай бұрын
Hi @silentspectator123. Sorry I'm late to this question (like 8 months late lol!). TL;DR: Message Integrity. In this case, the message signature (and signing algo) applied to the message can be used to ensure that the message is not tampered (either by accident or on purpose). Private key encryption is also great to ensure authenticity, but it may not cover for the message integrity. >>>>> End of the day, the best security is in layers and combining all these factors together <3333. <<<< PS: One thing worth mentioning. While I like IP whitelisting for letting the traffic in, I'm personally not a big fan of using IPs alone to determine authenticity (given IPs are elastic, shared, and ownership may change over time).
@VikasYadav-fc4fl Жыл бұрын
Ye nagarjun bahi
@mmin546 Жыл бұрын
Thank you for your video
@6un9-H09 ай бұрын
yes, great info!
@factstories147 Жыл бұрын
Thanks Liz Rice for the great informative session!
Жыл бұрын
Thanks! I suggest you make a comparison of OWASP ZAP and Nuclei.
@salmaniqbal2642 Жыл бұрын
I always had this feeling that something was missing in my life... and here we are with the answer, thank you Chris for an amazing presentation on policy as code
@fisherhawk7520 Жыл бұрын
Lll
@WilsonMar1 Жыл бұрын
Thank you for addressing the number one mistake in DAST.
@chadyz Жыл бұрын
What's the source(s) for the numbers displayed at 4:43 about AI usage in development?
@jk-pre-prod-priv5731 Жыл бұрын
Great question, here's the URL:
@chadyz Жыл бұрын
@@jk-pre-prod-priv5731 the url is missing from your answer ^^'
@hammadulhassan3623 Жыл бұрын
Such an Informative video about the Mobile APP Sec. However I'm not an Italian but I used the caption to listen you guys 😅. Kudos to you guys 🎉 for putting an effort to show the demo. Thanks alot
@Liviaboli Жыл бұрын
Começa no 3:10
@ezequiel8742 Жыл бұрын
😘 'promo sm'
@khazarhajiyev4828 Жыл бұрын
Thank you! Personally, I didn't get bored when listening theory part :)
@sheripatel6624 Жыл бұрын
Amazing. Thank you for insights Karan 😀
@Sushil2k4 Жыл бұрын
Well said both of you guys . Keep it up 👍🏻
@akirabrand9207 Жыл бұрын
Loving the graphics!!
@samuelrosa6732 Жыл бұрын
Cleitin exemplo de mais
@lucasfe3436 Жыл бұрын
Conteúdo sensacional. Parabéns
@me-vn9wk Жыл бұрын
Good thanks
@shamuscoghlan_807 Жыл бұрын
as a Security Architect I find the concept of IaaC very interesting, but writing the Security Requirements a bit challenging with not a lot of information in this area, at least in large Enterprise systems. Some risks are relatively obvious but it can get deep very fast. From a shift in Security, more specifically on who is in control of the Information this I truly believe is the future.
@baxiry. Жыл бұрын
1:35
@jeffreyjflim8 ай бұрын
thank you!
@cesarkohl Жыл бұрын
Great talk, thanks!
@ajantamoushumi2204 Жыл бұрын
Isnt it a frowned upon to include PII in audit logs? Asking cause your example includes IP address. Sorry, I dont have a technical background, just curious
@cesarkohl Жыл бұрын
Very interesting, thanks for sharing!
@iwalters3323 Жыл бұрын
OMG😍,Awww💞 I love this!!! You are late to the party - "promo sm"!!
@eliassantos9131 Жыл бұрын
Fica como sugestão de tópicos pras próximas calls, um vídeo por cada assunto desse. talvez com exemplos mais diretos pra amadurecer o nosso nível de devsecops em etapas
@haraheiquedossantos42832 жыл бұрын
Hello. Good video. In your opinion, where is the best place to save the audit logs. Do you think save these kind of logs in relational databases is a bad ideia? Because in the long term, it worsens the performance of searching the logs in addition to consuming a large amount of data inside database. Which tool do you think is better tho?