The new O’Reilly Security conferences will unite in-the-trenches defensive security practitioners and provide a forum for sharing concrete solutions.
Brian Sletten explains why today's encryption technology has government authorities' attention, and is a hot topic for technology companies and the general public alike.
Containing risk through continuous delivery.
Safeguard your iOS apps against common security loopholes.
How to build security in as an essential part of your workflow.
Russell Lewis outlines Netflix’s SSH bastion architecture, which allows them to audit and automatically alert after the fact rather than slowing down engineers before granting access.
Kelsey Gilmore-Innis shares the essential concepts behind securing your users’ data and offers examples of how she and her team applied them to Callisto.
Brian Sletten differentiates encoding and encryption by explaining the goals and techniques of each system.
Learn where the vulnerabilities are, and how to address them.
Brian Sletten discusses the evolution of cryptographic tools throughout history.
Oct. 31-Nov. 2, New York
Nov. 9-11, Amsterdam
The O'Reilly Security Conference provides pragmatic advice on defensive security practices, arming today's infosec practitioners with real-world tools and techniques.
Allison Miller works in product management at Google, mitigating risks to Google and end-users. Prior to her current role, Allison held technical and leadership roles in security, risk analytics, and payments/commerce at Electronic Arts, Tagged.com, PayPal/eBay, and Visa International. Miller is a p...
Zane Lackey is the Co-Founder/CSO at Signal Sciences and serves on the Advisory Boards of the Internet Bug Bounty Program and the US State Department-backed Open Technology Fund. Prior to Signal Scien...
Guy Podjarny is a cofounder at Snyk.io focusing on the security risk in your dependencies. Guy was previously CTO at Akamai and founder of Blaze.io. Guy is a frequent conference speaker, the author of...