Ruby Jane Cabagnot is an ASP.NET Core and Reactjs developer based in Oslo, Norway, and works for Avanade Norway. She has about 5 years of experience as a web designer/developer and over ten years as a content writer/manager. She believes that to be interesting, one must BE interested. You can find her on Twitter @rubyjane88
Actions are a relatively new feature to Github that allows you to set up CI/CD workflows using a configuration file right in your Github repo. Previously, if you wanted to set up any kind of automation with tests, builds, or deployments, you would have to look to services like Circle CI and Travis or write your own scripts. But with Actions, you have first-class support to powerful tooling to automate your workflow.
In this talk, we go over the items needed to prepare a development environment for Azure Bicep, including adding the Bicep extension to VS Code, adding the Bicep Command Line Interface (CLI), and installing or updating PowerShell and Azure CLI. Once in place, we walk through on how to create a simple Azure Storage account with Bicep.
Unlike JSON Web Tokens (JWT), which gives developers more than enough rope with which to hang themselves, Paseto only allows secure operations. JWT gives you "algorithm agility", Paseto gives you "versioned protocols". It's incredibly unlikely that you'll be able to use Paseto in an insecure way.
Many of you might have now seen GraphQL being used in a lot of web applications, some of you might have recognized right away that it's GraphQL and probably tried searching for what you can do with it some might not have realized that the request is something called GraphQL request. In this session, I’ll try to highlight the common misconfigurations in the usage of GraphQL and how they can be exploited.
Let's talk about OpenID Connect & OAuth 2.0 security best practices in a way that anyone can easily understand. In this talk, I will cover the fundamentals of user authentication in modern web applications and websites. I will start OpenID Connect and OAuth 2.0, then proceed with exploring stateful (session-based) and stateless (token-based) auth and examine cookies, JWT, and client storage in close detail.
Learn how to address the risks that today’s top mobile security threats pose to your organization. In this lightning talk, I will talk about the most common and critical mobile security threats that organizations face in 2021.
Quantum computers are not simply very fast regular computers. In this talk, I will present the definition of quantum computers, how does quantum computing works, superposition, entanglement, applications of quantum computing, applications in encryption, and the future of quantum computing.
Why GPUs crack passwords much faster than CPUs? In this talk, I will talk about FPGAs and ASICs, can Bitcoin mining ASICs be used for cracking Bcrypt passwords, and FPGA rigs for cracking Bcrypt passwords.
Learn all about Cross-Origin Resource Sharing, how it protects you, and how to enable CORS in your applications. We'll take a look at CORS, the circumstances under which it is needed, the benefits it provides, and how to configure a Node + Express application to support CORS.
Biometrics can reduce security risks, but they're not impenetrable. In this talk, I will talk about what executives need to know about using biometrics for their organization.