Ranked #1
Policy Enforcement with Shimon Tolts
Policy Enforcement with Shimon Tolts
The nature of software projects is changing. Projects are using a wider variety of cloud providers and SaaS tools. Proje... Read more
18 Feb 2019
•
54mins
Ranked #2
Identity and Encryption with Keybase Founder Max Krohn
Identity and Encryption with Keybase Founder Max Krohn
Keybase is an open-source key directory that allows users to encrypt messages and verify identities. Max Krohn is the co... Read more
4 Sep 2015
•
50mins
Ranked #3
Slack Security with Ryan Huber
Slack Security with Ryan Huber
Security for the popular chat application Slack is a major focus for the company. A corporate Slack account is as valuab... Read more
23 Sep 2016
•
52mins
Ranked #4
Ad Fraud Everywhere with Shailin Dhar
Ad Fraud Everywhere with Shailin Dhar
Advertising fraud is easy, legal, and extremely profitable. A fraudster can set up a website, scrape content from the in... Read more
13 Dec 2016
•
55mins
Ranked #5
Security Monitoring with Jeff Williams
Security Monitoring with Jeff Williams
The modern software supply chain contains many different points of distribution: JavaScript frameworks, npm modules, Doc... Read more
2 May 2019
•
49mins
Ranked #6
Web Security at Cloudflare, Pinterest, and Segment
Web Security at Cloudflare, Pinterest, and Segment
Last month, Software Engineering Daily had our 4th Meetup at Cloudflare in San Francisco. For this Meetup, the format wa... Read more
24 Jan 2018
•
1hr 26mins
Ranked #7
Ransomware with Tim Gallo and Allan Liska
Ransomware with Tim Gallo and Allan Liska
Ransomware uses software to extort people. A piece of ransomware might arrive in your inbox looking like a PDF, or a lin... Read more
27 Apr 2017
•
48mins
Ranked #8
Ad Fraud Research with Augustine Fou
Ad Fraud Research with Augustine Fou
A huge percentage of online advertisements are never seen by humans. They are viewed by bots–automated scripts that are ... Read more
20 Dec 2016
•
1hr 3mins
Ranked #9
Data Breaches with Troy Hunt
Data Breaches with Troy Hunt
When you hear about massive data breaches like the recent ones from LinkedIn, MySpace, or Ashley Madison, how can you fi... Read more
12 Aug 2016
•
56mins
Ranked #10
Secure Authentication with Praneet Sharma
Secure Authentication with Praneet Sharma
When I log into my bank account from my laptop, I first enter my banking password. Then the bank sends a text message to... Read more
5 Dec 2017
•
57mins
Ranked #11
QA Testing with Jonathan Alexander
QA Testing with Jonathan Alexander
Quality assurance testing is a form of testing that closely mirrors user behavior. Sometimes it is manual, sometimes it ... Read more
15 Aug 2017
•
47mins
Ranked #12
Keybase with Max Krohn
Keybase with Max Krohn
Public key encryption allows for encrypted, private messages. A message sent from Bob to Alice gets encrypted using Alic... Read more
24 Oct 2017
•
50mins
Ranked #13
MRuby and Language Security with Daniel Bovensiepen
MRuby and Language Security with Daniel Bovensiepen
Shopify is a company that helps customers build custom online storefronts. Shopify has built upon the same Ruby on Rails... Read more
17 Jul 2017
•
57mins
Ranked #14
Security and Machine Learning in the Call Center with Pindrop Security’s Chris Halaschek
Security and Machine Learning in the Call Center with Pindrop Security’s Chris Halaschek
Call centers are a vulnerable point of attack for large enterprises. Fraud accounts for more than $20 billion in lost mo... Read more
6 Jul 2016
•
56mins
Ranked #15
Grapl: Graph-Based Detection and Response with Colin O’Brien
Grapl: Graph-Based Detection and Response with Colin O’Brien
A large software company such as Dropbox is at a constant risk of security breaches. These security breaches can take th... Read more
13 May 2020
•
56mins
Ranked #16
Web Tracking with Bill Budington
Web Tracking with Bill Budington
The Internet is decreasing in privacy and increasing in utility. Under some conditions, this tradeoff makes sense. We pu... Read more
13 Apr 2017
•
49mins
Ranked #17
Snyk: Open Source Security with Guy Podjarny
Snyk: Open Source Security with Guy Podjarny
The software supply chain includes cloud infrastructure, on-prem proprietary solutions, APIs, programming languages, net... Read more
16 Dec 2019
•
55mins
Ranked #18
Container Security with Phil Estes
Container Security with Phil Estes
Containers have become the unit of infrastructure that many technology stacks deploy to. With the shift to containers, t... Read more
26 Sep 2016
•
59mins
Ranked #19
Botnets and Cybercrime with Shuman Ghosemajumder
Botnets and Cybercrime with Shuman Ghosemajumder
Modern automated attacks using widespread botnets have evolved in sophistication, making cybercrime an increasingly rele... Read more
15 Sep 2015
•
49mins
Ranked #20
Car and IoT Security with Chris Craig
Car and IoT Security with Chris Craig
Ransomware and DDoS attacks happen all the time. Sometimes they affect large swaths of users. WannaCry ransomware froze ... Read more
6 Sep 2017
•
49mins