#security on Video
What VPNs Actually Do (And the 3 Things They Don't)
Bitsize CuriosityEmpowering the Invisible: Building a Secure AI Insurance Agent with Auth0 Token Vault
ManuelSemgrep Observability with OpenTelemetry
Adam GardnerDeterministic Contract Risk Scanning in a Single HTML File (No AI, No Cloud)
MajedBuilt an AI Agent That Wrecked My Prod Database. Here's How I Fixed That
Nitish KovuruThe Future of Coding is Communication, Not Just Code
Carla Urrea StabileImplementing BLE Security on ESP32: LE Secure Connections the Hard Way
makepkgBuilding an Enterprise Release Governance Platform for Kubernetes (DevSecOps + CI/CD)
Debasish MohantyHow I Built a Local AI Docker Vulnerability Scanner (No API Costs, No Cloud)
Vijaya Rajeev BolluI Needed Disposable Linux Environments on My Mac. So I Built One.
Harsh SinghReal-time Malicious Package Protection for AI Coding Agents
Abhisek DattaPasskeys vs. Access-First: The Shift from Login to Lifecycle
Anton Minin BaranovskiiPasswordless access in minutes - Toqen.app integration demo
Anton Minin BaranovskiiAI-based Face Authentication system built with Python and deployed on Google Cloud Platform (GCP)!
Ramesh KRAgent Factory Recap: Securing AI Agents in Production
Aron EidelmanAgent Factory Recap: Can you do my shopping?
Shir Meir Lador# Defending the Cloud-Native Frontier: Security as Code with Terraform & OPA
Alam AhmedNDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025
Scale YouTubeUnderstanding HOTP and TOTP in Two-Factor Authentication
Manish PillaiNew AWS WAF Feature: Top Insights Visualizations
Carlos FilhoLooking to beef up the security of your AWS EC2 instances?
Carlos FilhoSoftware Systems Development - Session 1
Afrar MalakoothHow cryptography 💪works to protect ML models
Cossack Labs
29:01
How To Become A Software Architect
Taylor Veino
loading...