A door with no locks? Let’s talk about threat modeling Conference - INTERMEDIATE LEVEL Bárbara Teruggi View
Application security - Consistency is everything! Conference - INTERMEDIATE LEVEL Matt York JFrog View
Catch the hacker among 70 billion events per day Byte Size Session - BEGINNER LEVEL Kai Cao Mnemonic AS View
End-to-End Encryption for Streaming Data Pipelines Tools-in-Action - INTERMEDIATE LEVEL Hans-Peter Grahsl Decodable View
How the World's biggest robbery changes the way we look at Stores of Value, Cyber Security and Privacy Conference - INTERMEDIATE LEVEL James Birnie McBirnie View
Identifying and fixing Issues in Code using AI based tools Conference - INTERMEDIATE LEVEL Venkat Subramaniam Agile Developer, Inc. View
Java Developer's guide to shift-left security as part of the build process Conference - BEGINNER LEVEL Ian Lawson Red Hat View
Post Quantum Encryption: Protecting Tomorrow's Grid Today Byte Size Session - INTERMEDIATE LEVEL Danni Youziel Coding Black Females View
Securing LLM-Powered Applications: Overcoming Security and Privacy Challenges Conference - INTERMEDIATE LEVEL Brian Vermeer Snyk Lize Raes Naboo.ai View
The Enemy Within: How AI is Weaponizing Your Code Conference - BEGINNER LEVEL Steve Poole Independent Olimpiu Pop Remote Tech Ltd View
Securing LLM-Powered Applications: Overcoming Security and Privacy Challenges Similarity score = 0.54 More
Java Developer's guide to shift-left security as part of the build process Similarity score = 0.57 More