Posts Tagged ‘Security’
Troy Hunt: A private journey in the public eye | NDC Sydney
Troy Hunt has been hugely influential on how we respond to data breaches with his site https://haveibeenpwned.com, following such large profile data breaches like the Ashley Madison hack.
Read MoreAI Security Fundamentals | Ulysses Maclaren & Sarah Young | NDC Sydney 2024
Join us for an insightful discussion on AI and security fundamentals. Ulysses Maclaren from SSW TV and Sarah Young, Senior Cloud Security Advocate at Microsoft delve into the importance of maintaining traditional security measures alongside advancements in AI, covering topics such as model poisoning, data privacy concerns, and the role of AI in organizational security. Gain valuable insights for navigating the complex landscape of AI-enabled applications and safeguarding data integrity. Don’t miss this engaging conversation packed with expert advice and practical tips!
Read MoreDo you know how to choose an Enterprise Password Manager? | Warwick Leahy | SSW Rules
Most organizations store lots of passwords. There is often a need to share these passwords with other staff and these passwords all need to be unique, long and complex.
Read MoreRules to Better Security with Adam Cogan – The 10 tips CEOs Must Know
Do you know the security best practices for both end-users and SysAdmins?
Join Adam for the 10 tips CEOs must know for both end-users and SysAdmins.
Read MoreSecDevOps for Azure Functions and APIM in Hybrid cloud architecture with Lana Vyshnivetska
Join Lana as she shows us how to start with SecDevOps for Azure Functions and APIM in Hybrid cloud architecture.
Read MoreCracking passwords & why L33t!fied passwords are bad | Alexei Doudkine
Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…
Read MoreSymmetric encryption, hashing & digital signatures + More – Cryptography 101 | Robert Boedigheimer
Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…
Read MoreThe Ultimate .NET Core Developer Course (10 parts) – Dev SuperPowers .NET Core Tour
Build and host Enterprise Web Applications on .NET Core. .NET Core is out and it’s the most powerful and flexible version ever! Much of the day-to-day code you write will be the same – but the architecture and how your project fits together has changed. We will provide you with: A solid foundation in .NET…
Read MoreWhat does it take to make an application resilient to exploits? | Richard Campbell, Carl Franklin & Nina Juliadotter on .NET Rocks! Live from NDC Sydney 2018
NDC returned to Sydney this year and SSW TV was there alongside .NET Rocks! to catch all of the action with our Ask Me Anything! sessions. As usual there were a host of top industry pros talking about various subjects related to software development. This year, SSW TV worked alongside .NET Rocks! to run and…
Read MoreTroy Hunt & Scott Helme Weekly Update (105) featured on SSW TV & live from NDC 2018
NDC returned to Sydney this year and SSW TV was there alongside .NET Rocks! to catch all of the action with our Ask Me Anything! sessions. As usual there were a host of top industry pros talking about various subjects related to software development. This year, SSW TV worked alongside .NET Rocks! to run and…
Read More