Пікірлер
@bkkeats
@bkkeats 2 ай бұрын
Awesome work! Learned a lot.
@ulianalmeida8025
@ulianalmeida8025 3 ай бұрын
Boa tarde!
@colandre80
@colandre80 3 ай бұрын
Molto interessante. Bravi!👏
@bonjony_
@bonjony_ 3 ай бұрын
Parabéns! Adorei a proposta e conteúdo!
@GalexZ-
@GalexZ- 3 ай бұрын
I listened on Audibles and it was excellent! Who is "They" and how does the "World End"? I get that we need to prevent vulnerability like Sweden & Japan have. Have we already lost our country to a Hacker War? Will awareness reverse the damage and gather more on board to protect information even after we created this mess?
@lucasfe3436
@lucasfe3436 6 ай бұрын
Muito bom esse conteúdo. Estudei com o Rafael e muito legal ver hoje compartilhando experiências muito relevantes. Parabéns
@silentspectator123
@silentspectator123 7 ай бұрын
Please help me to understand the following. If the IP is whitelisted and SSL are in use. What is the use of using the Signing Algorithm? As the requests will be always from the verified provider. Other can't make a request due to IP whitelist in place.
@VikasYadav-fc4fl
@VikasYadav-fc4fl 8 ай бұрын
Ye nagarjun bahi
@mmin546
@mmin546 8 ай бұрын
Thank you for your video
@6un9-H0
@6un9-H0 4 ай бұрын
yes, great info!
@factstories147
@factstories147 8 ай бұрын
Thanks Liz Rice for the great informative session!
9 ай бұрын
Thanks! I suggest you make a comparison of OWASP ZAP and Nuclei.
@salmaniqbal2642
@salmaniqbal2642 9 ай бұрын
I always had this feeling that something was missing in my life... and here we are with the answer, thank you Chris for an amazing presentation on policy as code
@fisherhawk7520
@fisherhawk7520 10 ай бұрын
Lll
@WilsonMar1
@WilsonMar1 10 ай бұрын
Thank you for addressing the number one mistake in DAST.
@chadyz
@chadyz 11 ай бұрын
What's the source(s) for the numbers displayed at 4:43 about AI usage in development?
@jk-pre-prod-priv5731
@jk-pre-prod-priv5731 11 ай бұрын
Great question, here's the URL:
@chadyz
@chadyz 11 ай бұрын
@@jk-pre-prod-priv5731 the url is missing from your answer ^^'
@hammadulhassan3623
@hammadulhassan3623 11 ай бұрын
Such an Informative video about the Mobile APP Sec. However I'm not an Italian but I used the caption to listen you guys 😅. Kudos to you guys 🎉 for putting an effort to show the demo. Thanks alot
@Liviaboli
@Liviaboli 11 ай бұрын
Começa no 3:10
@ezequiel8742
@ezequiel8742 Жыл бұрын
😘 'promo sm'
@khazarhajiyev4828
@khazarhajiyev4828 Жыл бұрын
Thank you! Personally, I didn't get bored when listening theory part :)
@sheripatel6624
@sheripatel6624 Жыл бұрын
Amazing. Thank you for insights Karan 😀
@Sushil2k4
@Sushil2k4 Жыл бұрын
Well said both of you guys . Keep it up 👍🏻
@akirabrand9207
@akirabrand9207 Жыл бұрын
Loving the graphics!!
@samuelrosa6732
@samuelrosa6732 Жыл бұрын
Cleitin exemplo de mais
@lucasfe3436
@lucasfe3436 Жыл бұрын
Conteúdo sensacional. Parabéns
@me-vn9wk
@me-vn9wk Жыл бұрын
Good thanks
@shamuscoghlan4559
@shamuscoghlan4559 Жыл бұрын
as a Security Architect I find the concept of IaaC very interesting, but writing the Security Requirements a bit challenging with not a lot of information in this area, at least in large Enterprise systems. Some risks are relatively obvious but it can get deep very fast. From a shift in Security, more specifically on who is in control of the Information this I truly believe is the future.
@baxiry.
@baxiry. Жыл бұрын
1:35
@jeffreyjflim
@jeffreyjflim 3 ай бұрын
thank you!
@cesarkohl
@cesarkohl Жыл бұрын
Great talk, thanks!
@ajantamoushumi2204
@ajantamoushumi2204 Жыл бұрын
Isnt it a frowned upon to include PII in audit logs? Asking cause your example includes IP address. Sorry, I dont have a technical background, just curious
@cesarkohl
@cesarkohl Жыл бұрын
Very interesting, thanks for sharing!
@iwalters3323
@iwalters3323 Жыл бұрын
OMG😍,Awww💞 I love this!!! You are late to the party - "promo sm"!!
@eliassantos9131
@eliassantos9131 Жыл бұрын
Fica como sugestão de tópicos pras próximas calls, um vídeo por cada assunto desse. talvez com exemplos mais diretos pra amadurecer o nosso nível de devsecops em etapas
@haraheiquedossantos4283
@haraheiquedossantos4283 Жыл бұрын
Hello. Good video. In your opinion, where is the best place to save the audit logs. Do you think save these kind of logs in relational databases is a bad ideia? Because in the long term, it worsens the performance of searching the logs in addition to consuming a large amount of data inside database. Which tool do you think is better tho?
@canahmetbe
@canahmetbe Жыл бұрын
Thanks
@oleksiiivanov8854
@oleksiiivanov8854 Жыл бұрын
Cool content, thanks!
@jds2328
@jds2328 Жыл бұрын
Useful
@amol5436
@amol5436 Жыл бұрын
very practical insights. 👍
@LeviNotik
@LeviNotik Жыл бұрын
Excellent presentation. Todah rabah Hila!
@hilafish
@hilafish Жыл бұрын
Thanks Levi! I'm glad you enjoyed it :)
@cynthiamitchell5748
@cynthiamitchell5748 Жыл бұрын
Yes do you have any free materials for DevSecOps
@cesarsouza6
@cesarsouza6 Жыл бұрын
Great !!!!
@CassioBatistaPereira
@CassioBatistaPereira Жыл бұрын
I'm glad you liked Cesar!!!
@matthewzamat3331
@matthewzamat3331 Жыл бұрын
Great talk! Thank you
@kaysi768
@kaysi768 2 жыл бұрын
interesting talk, thank you
@kaysi768
@kaysi768 2 жыл бұрын
thank you, very informative
@kaysi768
@kaysi768 2 жыл бұрын
Great presentation
@stevieboy1984
@stevieboy1984 2 жыл бұрын
Great talk, thanks for sharing!
@DuyTran-ss4lu
@DuyTran-ss4lu 2 жыл бұрын
Awesome
@angelinagokhale9309
@angelinagokhale9309 2 жыл бұрын
Thank you for bringing these insightful talks to us! Thank you Eric and Brian for being such cool hosts! Loved the keynote by Neelu Tripathy!
@MarcellodeSales
@MarcellodeSales 2 жыл бұрын
Scorecard! wow!
@cj4362
@cj4362 2 жыл бұрын
Thank you for the upload. I've been looking at this book but I'm terrible at sitting down and reading or even using an audio book. this motivated me to pick up the book and actually get reading.
@jonnyhepcat
@jonnyhepcat 2 жыл бұрын
This is a great concept that moves the discussion past low/medium/high. A useful example here is with the EU’s MDR which requires risk to be reduced as low as possible. The credit rubric would provide clear prioritization and quantify residual risk to be eliminated or justified.