• Aus der IT-Forensik (Sebastian S., IT-Forensik Mecklenburg Vorpommern)
• Frederic Hemberger
There's no party like 3rd party – handle dependencies securely
Web developers use frameworks, libraries and 3rd-party services like analytics or advertising on a daily basis. But often we don't take the time to reflect how all those building blocks are affecting security. How can we take back control of what code really gets executed on our websites?
• Aus der IT-Forensik (Sebastian S., IT-Forensik Mecklenburg Vorpommern)
• Frederic Hemberger
There's no party like 3rd party – handle dependencies securely
Web developers use frameworks, libraries and 3rd-party services like analytics or advertising on a daily basis. But often we don't take the time to reflect how all those building blocks are affecting security. How can we take back control of what code really gets executed on our websites?
• Aus der IT-Forensik (Sebastian S., IT-Forensik Mecklenburg Vorpommern)
• Frederic Hemberger
There's no party like 3rd party – handle dependencies securely
Web developers use frameworks, libraries and 3rd-party services like analytics or advertising on a daily basis. But often we don't take the time to reflect how all those building blocks are affecting security. How can we take back control of what code really gets executed on our websites?
• Docker Security I (Martin)
Architektur, Design, Best Practice und Penetration Testing
• Aus der IT-Forensik (Sebastian S., IT-Forensik Mecklenburg Vorpommern)
• There's no party like 3rd party - handle dependencies securely (Frederic Hemberger)
Web developers use frameworks, libraries and 3rd-party services like analytics or advertising on a daily basis. But often we don't take the time to reflect how all those building blocks are affecting security. How can we take back control of what code really gets executed on our websites?
• Docker Security I (Martin)
Architektur, Design, Best Practice und Penetration Testing