Supply Chain Unchained - How To Be A Bad SaaS
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore a comprehensive analysis of supply chain security in SaaS environments through this 25-minute conference talk delivered at the 44CON Information Security Conference. Delve into the distinctions between flaws and bugs, examine rollbase access control, and investigate API restrictions. Gain insights into maturity evaluation processes, the importance of logging, cloud security considerations, and code integrity measures. Learn from April C. Wright, a seasoned hacker and security expert with over 25 years of experience, as she shares valuable knowledge on safeguarding critical communications and connections in the digital landscape.
Syllabus
Intro
Flaw vs Bug
Rollbase Access Control
API Restrictions
maturity evaluation
logs
cloud
code integrity
Taught by
44CON Information Security Conference
Related Courses
Aviation Security 10144CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube Why Security-as-a-Feature Will Never Happen
44CON Information Security Conference via YouTube