CI/CD Attack Scenarios: How to Protect Your Production Environment
53:22
Securing Your Software Supply Chain with JFrog and Azure
46:08
Building scalable real-time apps with AstraDB (DBaaS) and Vaadin
16:17
Understanding Attack Surfaces in CI/CD Pipelines | Svet Marina & Inny So, Cash App
56:36
Evaluating Your Event Streaming Needs the Software Architect Way | DZone Webinar by Aiven
27:18
Defend Your SAP Business One Cutting Edge Cybersecurity Tactics 1
22:41
Hacking CI/CD (Basic Pipeline Poisoning)
52:40
Identity and Access Management: A Practical Guide for the Busy Cybersecurity Professional
34:50