Category: Technology



Hacking is a key part of offensive security, which differs from defensive security in a couple of key ways. Defensive security is reactive. It involves preventing attacks, but also finding and responding to breaches when they occur. Offensive security is proactive and uses penetration testing, also known as ethical hacking. In penetration testing, developers simulate a hack on a system to see first, if they can hack it, and secondly, what happens if they do. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=yO3oS61M3aE https://www.youtube.com/watch?v=vmnw0rVte0A



With product security becoming an ever-more important aspect of software development, security “shift left” is gaining wide acceptance as a best practice to ensure high quality of product security. More and more traditional security companies are releasing shift-left products and capabilities, and the term is gaining momentum. Some open source security tools are way more developer-friendly than others, that’s why we’ve put together a list of 5 security tools that we believe developers should know of. This post is providing with a quick overview of those tools and why we consider them developer-friendly. We will dive into each security area they cover in our upcoming post and why you should also consider using it. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=mtMPJpoXV-w https://www.youtube.com/watch?v=M-LSpxgNxsM



What's next for Quantum Computing? Watch this Issue Briefing with some of the top experts in the industry to get the answers. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=_UBhaqPlkuc https://www.youtube.com/watch?v=g_Bx3ayJsTk