Learn Why an App-centric Approach Is Critical to Securing the Cloud
Data Theorem, Inc.
Learn Why an App-centric Approach Is Critical to Securing the Cloud
10:49
Google Project Zero Research into iMessage's Zero-click Attack
Data Theorem, Inc.
Google Project Zero Research into iMessage's Zero-click Attack
16:02
AWS SNS Attack Script
Data Theorem, Inc.
AWS SNS Attack Script
13:35
How attackers are taking advantage of Covid and Mobile Phishing
Data Theorem, Inc.
How attackers are taking advantage of Covid and Mobile Phishing
13:54
Apple Data Disclosures
Data Theorem, Inc.
Apple Data Disclosures
11:16
5 Web Security Considerations for GraphQL
Data Theorem, Inc.
5 Web Security Considerations for GraphQL
28:38
How Attackers Take Advantage of An UnMonitored Full Stack App
Data Theorem, Inc.
How Attackers Take Advantage of An UnMonitored Full Stack App
13:07
How An Unsecured Server Led To A Microsoft Data Breach
Data Theorem, Inc.
How An Unsecured Server Led To A Microsoft Data Breach
19:38
Security and Privacy Changes in Android 11
Data Theorem, Inc.
Security and Privacy Changes in Android 11
30:42
Application Security May Not Matter If The Full Stack Is Ignored
Data Theorem, Inc.
Application Security May Not Matter If The Full Stack Is Ignored
13:57
Which AppSec Attack Vector Allows Hackers to Exfiltrate Data? (Full stack data breach)
Data Theorem, Inc.
Which AppSec Attack Vector Allows Hackers to Exfiltrate Data? (Full stack data breach)
16:54
Remote Hijacking & Control of Smart Devices
Data Theorem, Inc.
Remote Hijacking & Control of Smart Devices
20:29
Security and Privacy Changes in iOS 14
Data Theorem, Inc.
Security and Privacy Changes in iOS 14
56:19
10 Tips to Secure Contact Tracing Apps
Data Theorem, Inc.
10 Tips to Secure Contact Tracing Apps
13:27
What is full stack application security?
Data Theorem, Inc.
What is full stack application security?
1:07
How Integrated, Continuous Security Checks Can Save Your Business and Millions of Dollars
Data Theorem, Inc.
How Integrated, Continuous Security Checks Can Save Your Business and Millions of Dollars
21:17
How modern data breaches attack every layer of the application stack
Data Theorem, Inc.
How modern data breaches attack every layer of the application stack
14:49
iOS Clipboard Spying
Data Theorem, Inc.
iOS Clipboard Spying
21:01
Introduction to Web Secure
Data Theorem, Inc.
Introduction to Web Secure
7:47
Why Stop AppSec Data Breaches
Data Theorem, Inc.
Why Stop AppSec Data Breaches
24:57
Exploit Analysis: Sign-in with Apple
Data Theorem, Inc.
Exploit Analysis: Sign-in with Apple
17:38
Protect web apps from XSS exploits
Data Theorem, Inc.
Protect web apps from XSS exploits
18:23
Introduction to API Secure
Data Theorem, Inc.
Introduction to API Secure
5:41
Managing AppSec Compliance at Provident Credit Union
Data Theorem, Inc.
Managing AppSec Compliance at Provident Credit Union
23:59
Contact Tracing 101
Data Theorem, Inc.
Contact Tracing 101
13:53
Identify Third Party Trackers in Apps
Data Theorem, Inc.
Identify Third Party Trackers in Apps
30:58
How to Protect Application Attack Surfaces
Data Theorem, Inc.
How to Protect Application Attack Surfaces
14:39
Inside Data Theorem’s Mobile AppSec Program
Data Theorem, Inc.
Inside Data Theorem’s Mobile AppSec Program
5:02
Take a Peek at API Secure
Data Theorem, Inc.
Take a Peek at API Secure
1:40
Security Automation on AWS
Data Theorem, Inc.
Security Automation on AWS
19:03
How Low Tech Hackers Hack Your API in 15min or Less
Data Theorem, Inc.
How Low Tech Hackers Hack Your API in 15min or Less
19:53
How To Leverage iOS 13 for App Security
Data Theorem, Inc.
How To Leverage iOS 13 for App Security
27:51
Kids, Privacy, and Apps
Data Theorem, Inc.
Kids, Privacy, and Apps
23:11
Did You Know CCPA Has Already Begun?
Data Theorem, Inc.
Did You Know CCPA Has Already Begun?
26:38
Automated Security for DevOps
Data Theorem, Inc.
Automated Security for DevOps
1:26
Serverless vs Containers: A Case Study of Building and Securing Real-world Microservices
Data Theorem, Inc.
Serverless vs Containers: A Case Study of Building and Securing Real-world Microservices
30:36
How to Automate an API Security Program without Adding Staff
Data Theorem, Inc.
How to Automate an API Security Program without Adding Staff
23:57
What’s New In Apple iOS 12 Security and Privacy
Data Theorem, Inc.
What’s New In Apple iOS 12 Security and Privacy
15:02
Top 6 Security Needs for APIs and Serverless Apps
Data Theorem, Inc.
Top 6 Security Needs for APIs and Serverless Apps
36:21
How to Deal with Fraudulent Counterfeit Apps
Data Theorem, Inc.
How to Deal with Fraudulent Counterfeit Apps
20:41
How to Automate Mobile AppSec without the Staff
Data Theorem, Inc.
How to Automate Mobile AppSec without the Staff
33:47
Automate Compliance Audits without the Staff
Data Theorem, Inc.
Automate Compliance Audits without the Staff
29:00
TrustKit: Drag & Drop SSL Pinning for iOS apps
Data Theorem, Inc.
TrustKit: Drag & Drop SSL Pinning for iOS apps
0:08