#security on Video
NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025
Scale YouTubeUnderstanding HOTP and TOTP in Two-Factor Authentication
Manish PillaiProduct sense - Intro to Keyshade
Johnny SantamariaNew AWS WAF Feature: Top Insights Visualizations
Carlos FilhoLooking to beef up the security of your AWS EC2 instances?
Carlos FilhoSoftware Systems Development - Session 1
Afrar Malakooth
00:18
HELLO WORLD in Morse Code
Souvik PaulHow cryptography 💪works to protect ML models
Cossack Labs
29:01
How To Become A Software Architect
Taylor VeinoEncoding vs encryption for 📱iOS app devs
Cossack LabsDeveloper Expectation vs Reality
Dae Won KimE2EE and privacy in mobile messengers, by @vixentael
Cossack LabsComplicated encryption ways explained in 2 min, by @vixentael
Cossack LabsWhich encryption control to choose for your app protection, by Anastasiia Voitova
Cossack LabsWhy security, encryption, and privacy are not the same thing, by Anastasiia Voitova
Cossack LabsKeeping GitHub Action workflows secure
Brian Douglas📱Building reliable mobile app security
Cossack LabsLive Exploiting Your Open Source Dependencies with Brian Vermeer
Brian Vermeer 🧑🏼🎓🧑🏼💻Freedom of Security with Paula de la Hoz
PaulaAlready Hacked - Security Environment of the System
HamdamboyThe Fast Track to Serverless Security on AWS
Andrew Brown 🇨🇦Azure Secure DevOps Kit
Eng Soon CheahAWS White Paper Walkthrough - Security Overview of AWS Lambda March 2019
Andrew Brown 🇨🇦The Fast Track to AWS Security - Feb 26 2019
Andrew Brown 🇨🇦
loading...