Security

Sort by:

Data Breaches with Troy Hunt

When you hear about massive data breaches like the recent ones from LinkedIn, MySpace, or Ashley Madison, how can you find out whether your own data was compromised?   Troy Hunt

Security and Machine Learning in the Call Center with Pindrop Security’s Chris Halaschek

Call centers are a vulnerable point of attack for large enterprises. Fraud accounts for more than $20 billion in lost money every year, and a significant portion of that fraud is due to

Secret Management and Vault with Hashicorp’s Seth Vargo

Every software application has secrets. User passwords and database credentials must be managed carefully, because poor access controls can lead to disaster scenarios. Vault is a tool

Internet of Things and DevOps with Anders Wallgren

“The three legs of the stool are culture, process, and tooling, and I think process and tooling are the easy ones.” Continue reading…

Let’s Encrypt with Josh Aas

“If everyone is going to use TLS, people need to trust their certificate authority, and the way to gain trust is through openness.” Continue reading…