ConTejas Code cover image

Liran Tal: How to Secure Your Apps and AI Agents

ConTejas Code

00:00

Navigating Security: The Risks of 2FA and Dependency Management

This chapter explores the weaknesses of two-factor authentication (2FA) and various attack methods, such as side-channel attacks. It highlights the critical need for manual audits alongside automated tools to safeguard high-risk systems and addresses the challenges of dependency management in software development.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app