Watch How The Giants Fall: Learning from Bug Bounty Results
Presented by: John Melton
Security is hard. We all miss things. Attackers find things. ...
Format: General SessionLevel: Introductory and overviewProtecting your API with OAuth
Presented by: Dan Moore
OAuth is a well known standard and is useful for delegating authentication and authorization decisions to a central identity provider. As a developer, you’ve given a token when a grant completes. ...
Format: General SessionLevel: Introductory and overviewKeeping your Kubernetes Cluster Secure
Presented by: Gene Gotimer
Many organizations are shifting to containers and Kubernetes, and that move means learning new ways to secure their environments. Kubernetes clusters have to be hardened at different levels. We have to consider the nodes where the Kubernetes control plane is running. We also need to secure the...
Format: General SessionLevel: IntermediateJakarta EE 10 is Coming Your Way!
Presented by: Ivar Grimstad
Jakarta EE 9 lowered the barriers of entry and established a foundation for future innovation paving the way for Jakarta EE 10. ...
Format: General SessionLevel: Intermediate