Data Theorem, Inc.
Learn Why an App-centric Approach Is Critical to Securing the Cloud
10:49
Data Theorem, Inc.
Google Project Zero Research into iMessage's Zero-click Attack
16:02
Data Theorem, Inc.
AWS SNS Attack Script
13:35
Data Theorem, Inc.
How attackers are taking advantage of Covid and Mobile Phishing
13:54
Data Theorem, Inc.
Apple Data Disclosures
11:16
Data Theorem, Inc.
5 Web Security Considerations for GraphQL
28:38
Data Theorem, Inc.
How Attackers Take Advantage of An UnMonitored Full Stack App
13:07
Data Theorem, Inc.
How An Unsecured Server Led To A Microsoft Data Breach
19:38
Data Theorem, Inc.
Security and Privacy Changes in Android 11
30:42
Data Theorem, Inc.
Application Security May Not Matter If The Full Stack Is Ignored
13:57
Data Theorem, Inc.
Which AppSec Attack Vector Allows Hackers to Exfiltrate Data? (Full stack data breach)
16:54
Data Theorem, Inc.
Remote Hijacking & Control of Smart Devices
20:29
Data Theorem, Inc.
Security and Privacy Changes in iOS 14
56:19
Data Theorem, Inc.
10 Tips to Secure Contact Tracing Apps
13:27
Data Theorem, Inc.
What is full stack application security?
1:07
Data Theorem, Inc.
How Integrated, Continuous Security Checks Can Save Your Business and Millions of Dollars
21:17
Data Theorem, Inc.
How modern data breaches attack every layer of the application stack
14:49
Data Theorem, Inc.
iOS Clipboard Spying
21:01
Data Theorem, Inc.
Introduction to Web Secure
7:47
Data Theorem, Inc.
Why Stop AppSec Data Breaches
24:57
Data Theorem, Inc.
Exploit Analysis: Sign-in with Apple
17:38
Data Theorem, Inc.
Protect web apps from XSS exploits
18:23
Data Theorem, Inc.
Introduction to API Secure
5:41
Data Theorem, Inc.
Managing AppSec Compliance at Provident Credit Union
23:59
Data Theorem, Inc.
Contact Tracing 101
13:53
Data Theorem, Inc.
Identify Third Party Trackers in Apps
30:58
Data Theorem, Inc.
How to Protect Application Attack Surfaces
14:39
Data Theorem, Inc.
Inside Data Theorem’s Mobile AppSec Program
5:02
Data Theorem, Inc.
Take a Peek at API Secure
1:40
Data Theorem, Inc.
Security Automation on AWS
19:03
Data Theorem, Inc.
How Low Tech Hackers Hack Your API in 15min or Less
19:53
Data Theorem, Inc.
How To Leverage iOS 13 for App Security
27:51
Data Theorem, Inc.
Kids, Privacy, and Apps
23:11
Data Theorem, Inc.
Did You Know CCPA Has Already Begun?
26:38
Data Theorem, Inc.
Automated Security for DevOps
1:26
Data Theorem, Inc.
Serverless vs Containers: A Case Study of Building and Securing Real-world Microservices
30:36
Data Theorem, Inc.
How to Automate an API Security Program without Adding Staff
23:57
Data Theorem, Inc.
What’s New In Apple iOS 12 Security and Privacy
15:02
Data Theorem, Inc.
Top 6 Security Needs for APIs and Serverless Apps
36:21
Data Theorem, Inc.
How to Deal with Fraudulent Counterfeit Apps
20:41
Data Theorem, Inc.
How to Automate Mobile AppSec without the Staff
33:47
Data Theorem, Inc.
Automate Compliance Audits without the Staff
29:00
Data Theorem, Inc.
TrustKit: Drag & Drop SSL Pinning for iOS apps
0:08