A survey reveals a deep divide between developer aspirations for security and organizational practices.
The O’Reilly Security Podcast: Threat hunting’s role in improving security posture, measuring threat hunting success, and the potential for automating threat hunting for the sake of efficiency and consistency.
Exploring the disconnect between security wisdom and user realities.
The O’Reilly Security Podcast: Why legal responses to bug reports are an unhealthy reflex, thinking through first steps for a vulnerability disclosure policy, and the value of learning by doing.
Join Safari. Get a free trial today and find answers on the fly, or master something new and useful.
Learn how uncoupling development from security using AWS Identity and Access Management can enhance security.
Learn how you can use Nmap to scan your network to find out which services and hosts are listening and may be vulnerable to compromise.
Building transparency and individual choice into IoT security.
Expanding the blue team by building a security culture program.
Techniques for securely improving page performance.
New York, NY
Build better defenses
Allison Miller works in product management at Google, mitigating risks to Google and end-users. Prior to her current role, Allison held technical and ...