Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 3min
Security Training - I Love the Way That You Explain It
03:26 • 2min
Access Control - The Integrity of a Medical Device
04:59 • 2min
Why Purple?
07:02 • 4min
We Hack Purple Dot Com, Isara
10:57 • 2min
The Number One Reason for Data Breach Is Insecure Soft Way
12:52 • 4min
Is There a Massive Opportunity for Developers?
17:01 • 6min
What Do You Want to Be When You're a Developer?
22:36 • 3min
How Agile and Devops Can Help You in Life
25:08 • 3min
The Third Way of Devops Is Continuous Learning
28:32 • 3min
Continuous Integration, Continuous Delivery, Continuous Deployment
31:35 • 2min
The System Development Life Cycle
33:28 • 3min
Pentesting in the Design Phase of a Software Development Environment
36:49 • 3min
How to Schedule a Pentest Into Your Project
39:47 • 2min
How Can We Solve This Problem Together?
41:31 • 4min
Application Security Foundations - Is This the Job for Me?
45:16 • 3min
Application Security Foundations Level One
48:42 • 2min
Is Twitter a Good Place to Start?
50:35 • 2min
What Is a Supply Chain?
52:56 • 4min
What Is Dependabot?
56:38 • 5min
Get a Whole Lot of Technical Content and Free Content
01:01:17 • 2min