- Presentations
- Documents
- Infographics
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
•
6 years ago
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
•
8 years ago
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
•
6 years ago
DevSecOps in Baby Steps
Priyanka Aash
•
8 years ago
Application Security Guide for Beginners
Checkmarx
•
7 years ago
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
DevOpsDays Tel Aviv
•
8 years ago
Bringing Security Testing to Development: How to Enable Developers to Act as Security Experts
Achim D. Brucker
•
8 years ago
Devops security-An Insight into Secure-SDLC
Suman Sourav
•
8 years ago
Attack modeling vs threat modelling
Invisibits
•
8 years ago
Kubernetes Networking - Sreenivas Makam - Google - CC18
CodeOps Technologies LLP
•
5 years ago
An analysis of TLS handshake proxying
Nick Sullivan
•
8 years ago
DevSecCon London 2018: Lessons from the legion (the DevSecCon London Remix)
DevSecCon
•
5 years ago
1 info sec+risk-mgmt
madunix
•
8 years ago
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
•
7 years ago
Cloud Computing Stats - Security and Recovery
RapidScale
•
9 years ago
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
•
9 years ago
Security models for security architecture
Vladimir Jirasek
•
12 years ago
Security architecture
Duncan Unwin
•
11 years ago
7 Use Cases in 7 Minutes Each : The Power of Workflows and Automation (SVC101) | AWS re:Invent 2013
Amazon Web Services
•
10 years ago
Mitel corp presentation
RylanHarris
•
13 years ago