Tips for writing a successful proposal for the O'Reilly Security Conference.
Using indicators to identify campaigns by comparing attacks.
What is HTTP Strict Transport Security and why should you use it?
The O’Reilly Security Podcast: The five stages of vulnerability disclosure grief, hacking the government, and the pros and cons of bug bounty programs.
Join Safari. Get a free trial today and find answers on the fly, or master something new and useful.
Learn how uncoupling development from security using AWS Identity and Access Management can enhance security.
Build regulatory compliance into development and operations, and write compliance and checks and auditing into continuous delivery, so it becomes an integral part of how your DevOps team works.
Learn this new security fuzz testing technique that leverages browser capabilities to detect cross-site scripting vulnerabilities before production deployment.
Exploring the economics of cybersecurity.
Learn how to prevent potential enterprise data leakages from your cloud computing accounts.
Allison Miller works in product management at Google, mitigating risks to Google and end-users. Prior to her current role, Allison held technical and leadership roles in security, risk analytics, and payments/commerce at Electronic Arts, Tagged.com, PayPal/eBay, and Visa International. Miller is a p...
Zane Lackey is the Co-Founder/CSO at Signal Sciences and serves on the Advisory Boards of the Internet Bug Bounty Program and the US State Department-backed Open Technology Fund. Prior to Signal Scien...
Guy Podjarny is a cofounder at Snyk.io focusing on the security risk in your dependencies. Guy was previously CTO at Akamai and founder of Blaze.io. Guy is a frequent conference speaker, the author of...