SecurityBiometrics is all the rage. It has been touted as the best of all possible authentication methods. Very soon, your customers and standards boards will require you to implement some sort of biometric factor for authentication. Before you head down that road, you need to know the pitfalls to avoid before becoming the next big breach in the news. Learn a few tricks to help safely secure biometrics to protect your users.
SecurityHealth data is some of the most private information your app can collect. You have a duty to your users to keep that data private, secure and encrypted. You also need to adhere to strict laws protecting that privacy, including HIPAA in the USA, the Data Protection Directive in the EU and PIPEDA/PHIPA in Canada.
You'll learn about Protected Health Information (PHI) and how to protect it on Amazon Web Services.
SecurityIn modern web environment, there is plenty of XSS protection mechanisms. Web browsers (Chrome, Internet Explorer, Edge) are providing client-side filtering for XSS to defend their users. What are the limitations of each? Frameworks are also adding proactive mechanisms. Can we rely on them?
There will be no 0-day bypass for web browser bypass.
SecuritySecurity is an enormous topic, and it’s really complicated. If you’re not careful, you’ll find yourself vulnerable to any number of attacks which you don’t want to be on the receiving end of. This talk will give you a taster of the vast amount there is to know about security in modern web apps, such as writing secure PHP web apps and securing a Linux server.
SecurityAre you worried that your REST API may be the next victim of an attack by ruthless hackers? Don't fret. Utilizing the same standards implemented by OAuth 2.0 and OpenID Connect, you can secure your REST API. JSON Object Signing and Encryption (JOSE) is the core of a truly secure standards-based REST API. Let me show you how to ensure the data sent too and received from your API is as safe and secure as is reasonably possible.
SecurityYou’ve mapped it out in Visio, put in place all the caching and gateways possible, flip the switch…and nothing. Your beautiful microservice architecture fell on its face! In this experience report, we will look at a failed microservice implementation and how we fixed it, from the ground up.
SecuritySecurity best practices are often generic and language agnostic. This makes the life of a developer much harder than it should be. In this talk, a survey of the most common vulnerabilities in .NET context will be presented. Different vulnerability classes will be explored including XSS, injections and application misconfigurations. This will be done through live demos using open-source vulnerability finding tools specialized for .NET.
To provide the best experiences, the usage of cookies are necessary. Some are essential for the proper functioning of the site, while others help us better cater to your interests.