Security
Cyber Warfare with Jared Smith
Vulnerabilities exist in every computer system. As a system gets bigger, the number of vulnerabilities magnifies. The web is the biggest, most complex computer system we have–but
Security Research with Samy Kamkar
Every digital system has vulnerabilities. Cars can be hacked, locked computers can be exploited, and credit cards can be spoofed. Security researchers make a career out of finding these
Antifraud Architecture with Josh Yudaken
Online marketplaces and social networks often have a trust and safety team. The trust and safety team helps protect the platform from scams, fraud, and malicious actors. To detect these
Fraud Prevention with Pete Hunt
When Facebook acquired Instagram, one of the first systems Instagram plugged into was Facebookâs internal spam and fraud prevention system. Pete Hunt was the first Facebook engineer to
Container Security with Phil Estes
Containers have become the unit of infrastructure that many technology stacks deploy to. With the shift to containers, the attack surface of an application has changed, and we need to








