Content tagged as 'Cybersecurity'

Here is a list of all the content that has been tagged as cybersecurity.

Natalie Silvanovich on Attack Surface Reduction

Natalie Silvanovich from Google Project Zero talks with Kim Carter about what attack surface reduction is about.

purpleteam

Automated security regression testing of your web applications and APIs, no setup required.

1. Write test conditions -> convert to Cucumber
2. Provide minimal configuration
3. Consume node CLI package
4. Run single command purpleteam test
Perfect for your CI/nightly build

Cloud Security

Discussion about Kim’s new book on Cloud Security, some of the content, and links to other useful resources around securing your Cloud environments.

Cloud Security - Quick Reference

Are you looking to achieve a good understanding of your responsibilities as well as your CSPs responsibilities to make sure your security stature in the Cloud is where you need it to be? Do you need the technical direction required to create your secure Cloud environment? You can think of this book as your technical Cloud consultant.

Docker Security

Discussion about Kim’s new book on Docker Security, some of the content, and links to other useful resources around securing your Docker deployments.

Development Team Security Teardown $995NZ + GST

We can provide insight into potential issues/defects that are not obvious with your Development Team(s):
• Development Process
• System Being Developed
Our Teardown can provide the needed visibility in order to make the improvements.

Péter Budai on End to End Encryption

Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption.

Workshop - Building Security Into Your Development Teams

Kim’s flagship Software Developer focussed training, this time at OWASP New Zealand Day conference.

Scott Piper on Cloud Security

Founder of Summit Route / creator of FLAWS, Scott Piper talks with Kim Carter about Cloud Security on Software Engineering Radio.

Docker Security - Quick Reference

Are you looking to improve the security of your Docker deployments? Do you want to confirm you haven’t missed any important security aspects in your Docker infrastructure?