League of Extraordinary Defenders
Announcing the inaugural program committee for the O’Reilly Security conferences.
Insights, tools, and best practices to keep your organization and users secure.
Announcing the inaugural program committee for the O’Reilly Security conferences.
The new O’Reilly Security conferences will unite in-the-trenches defensive security practitioners and provide a forum for sharing concrete solutions.
Why leaders need to carefully evaluate the cost of keeping IoT networks safe.
An informed approach to consuming popular infosec research.
Learn the hands-on basics of securing a Hadoop cluster in AWS in this video excerpt.
Some of the most profitable decisions are made by combining data in novel ways, but creative combinations of data can also spawn unknown risks. Learn how your organization can balance risk and reward in a data-driven economy.
Knowing the difference between trusted and trustworthy is fundamental to understanding how to build secure software. In this exclusive video excerpt from Introduction to Secure Software, Brian Sletten explains the browser's transitive trust model.
Learn how to understand the threats you face by collecting, mining, organizing, and analyzing as many relevant data sources as possible. Excerpt from Crafting the InfoSec Playbook.
Creating security leading practices for Amazon Web Services.
Why formulating the right kind of question is crucial to measuring risk.
Finding appropriate levels of security.
Understand and defend against the many faces of cyber crime.
The “Golem” bug underscores the complex interdependencies associated with DNS.
This talk introduces Snyk Stranger, a tool that helps you track and control third-party code and security concerns.
Learn about the core operations and key principles that make up a good secret management system.
Good security policies do not guarantee protection against attacks. Learn why you need a strong operations security team to implement security measures.
Announcing the O’Reilly Security Conference, Oct. 31-Nov. 2 in New York City and Nov. 9-11 in Amsterdam.
The engineering principles inherent to DevOps and continuous deployment provide the groundwork for a number effective security mechanisms.
"Cyber" this and "cyber" that may seem tedious, but it's time to treat cyber security as a meta-field overlaying information security.
This talk explores the motivation behind Pearson's AppSec pipeline, its implementation, and tips for getting the most from your own AppSec program.
In this webcast presentation, Gilad Rosner explores how the Internet of Things impacts privacy and, by extension, what it means for society.
Hugo Fiennes examines key aspects of building and deploying secure Internet of Things devices, including hardware security, link security, identity, device updating, and servers, and more.
With our dependence on IoT devices expected to skyrocket, it's critical to consider plausible scenarios of attacks based upon our understanding of how these devices will serve our needs in the future.
Controversial ideas for privacy protection.