Are we out of the woods?
Bruce Potter on why and how to build a risk assessment program.
Carrying on Becky Bace’s legacy of encouraging and celebrating defenders.
Five questions for Charles Givre on building effective security analytics programs.
Five questions for Josiah Dykstra on techniques to expose and invalidate misleading claims.
The O’Reilly Security Podcast: Shifting secure code responsibility to developers, building secure software quickly, and the importance of changing processes.
Join Safari. Get a free trial today and find answers on the fly, or master something new and useful.
Learn how uncoupling development from security using AWS Identity and Access Management can enhance security.
Learn how you can use Nmap to scan your network to find out which services and hosts are listening and may be vulnerable to compromise.
Building transparency and individual choice into IoT security.
Expanding the blue team by building a security culture program.
Techniques for securely improving page performance.
New York, NY
Build better defenses
Allison Miller works in product management at Google, mitigating risks to Google and end-users. Prior to her current role, Allison held technical and ...