Empowering Junior Testers: Strategies For Uncovering Critical Vulns In Web Applications - Tom Stacey
34:08
KCD Denmark 2024: How Saxo Blueprint Leverages Kubernetes Operators and GitOps - Jimmi Hested
23:54
"Cloud-native application packaging and management: Crossplane" by Aarno Aukia
40:47
Cloaked In Pixels: Concealing Payloads With Steganography - Ben Folland
27:41
OfCORS! How To Do Cross Origin Resource Sharing (im)properly. - Cory Turner
42:05
Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale - Ross Bevington
59:46
Become a better security engineer (by not doing security) - Kane Narraway
42:22
The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies - Richard Foster
36:41