
February 2018
Security


All-in-one security with open source tools
All-in-one security with open source tools
February 2018
Security


Closing Keynote: Measuring and maximizing vuln discovery efforts
Closing Keynote: Measuring and maximizing vuln discovery efforts
February 2018
Security


DevOps – An opportunity for better Security
DevOps – An opportunity for better Security
February 2018
Security


In graph we trust: Microservices, GraphQL and security challenges
In graph we trust: Microservices, GraphQL and security challenges
February 2018
Security


Opening Keynote: Lessons learned defending web applications in the age of DevOps/Cloud
Opening Keynote: Lessons learned defending web applications in the age of DevOps/Cloud
February 2018
Security


Securing automation and solving the Secret Zero problem.
Securing automation and solving the Secret Zero problem.
February 2018
Security


System call auditing made effective with machine learning and selective reporting
System call auditing made effective with machine learning and selective reporting
February 2018
Security


Variant Analysis – A critical step in handling vulnerabilities
DevSecCon London 2018