Security
Troy Hunt: A private journey in the public eye | NDC Sydney
Troy Hunt has been hugely influential on how we respond to data breaches with his site https://haveibeenpwned.com, following such large profile data breaches like the Ashley Madison hack.
Read MoreAI Security Fundamentals | Ulysses Maclaren & Sarah Young | NDC Sydney 2024
Join us for an insightful discussion on AI and security fundamentals. Ulysses Maclaren from SSW TV and Sarah Young, Senior Cloud Security Advocate at Microsoft delve into the importance of maintaining traditional security measures alongside advancements in AI, covering topics such as model poisoning, data privacy concerns, and the role of AI in organizational security. Gain valuable insights for navigating the complex landscape of AI-enabled applications and safeguarding data integrity. Don’t miss this engaging conversation packed with expert advice and practical tips!
Read MoreBeyond Passwords: The Future (and Present) of Authentication
We all know passwords are not fit for purpose, and we’re slowly making our way to a “post-password” world. Passwords are a problem for security, convenience, and accessibility, and the future of authentication won’t involve passwords at all.
Read MoreDo you know how to choose an Enterprise Password Manager? | Warwick Leahy | SSW Rules
Most organizations store lots of passwords. There is often a need to share these passwords with other staff and these passwords all need to be unique, long and complex.
Read MoreTech News #14 VS Code, GitHub push protect, NET MAUI RC, Azure VMs + ARM chips, GitHub code search
Did someone ask “What’s the latest Github update?” Join our CEO Adam Cogan as he gives us the monthly tech news update from the SSW Brisbane office.
Read MoreRules to Better Security with Adam Cogan – The 10 tips CEOs Must Know
Do you know the security best practices for both end-users and SysAdmins?
Join Adam for the 10 tips CEOs must know for both end-users and SysAdmins.
Read MoreCracking passwords & why L33t!fied passwords are bad | Alexei Doudkine
Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…
Read MoreSymmetric encryption, hashing & digital signatures + More – Cryptography 101 | Robert Boedigheimer
Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…
Read MoreWhat does it take to make an application resilient to exploits? | Richard Campbell, Carl Franklin & Nina Juliadotter on .NET Rocks! Live from NDC Sydney 2018
NDC returned to Sydney this year and SSW TV was there alongside .NET Rocks! to catch all of the action with our Ask Me Anything! sessions. As usual there were a host of top industry pros talking about various subjects related to software development. This year, SSW TV worked alongside .NET Rocks! to run and…
Read MoreTroy Hunt & Scott Helme Weekly Update (105) featured on SSW TV & live from NDC 2018
NDC returned to Sydney this year and SSW TV was there alongside .NET Rocks! to catch all of the action with our Ask Me Anything! sessions. As usual there were a host of top industry pros talking about various subjects related to software development. This year, SSW TV worked alongside .NET Rocks! to run and…
Read More