Security

Sort by:

Grapl: Graph-Based Detection and Response with Colin O’Brien

A large software company such as Dropbox is at a constant risk of security breaches. These security breaches can take the form of social engineering attacks, network breaches, and other

Static Analysis for Infrastructure with Guy Eisenkot

Infrastructure-as-code tools are used to define the architecture of software systems. Common infrastructure-as-code tools include Terraform and AWS CloudFormation.  When infrastructure

Zoom Vulnerabilities with Patrick Wardle

Zoom video chat has become an indispensable part of our lives. In a crowded market of video conferencing apps, Zoom managed to build a product that performs better than the competition,

Cloud Log Analysis with Jack Naglieri

Large software companies have lots of users, and the activity from those users results in high volumes of traffic. These companies also have a large surface area across the enterprise. 

Snyk: Open Source Security with Guy Podjarny

The software supply chain includes cloud infrastructure, on-prem proprietary solutions, APIs, programming languages, networking products, and open source software.  Each of these