QAing the security way!

Lead Consultant at ThoughtWorks
Mar. 20, 2018
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
QAing the security way!
1 of 57

More Related Content

What's hot

Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsNarudom Roongsiriwong, CISSP
Honeypot EssentialsHoneypot Essentials
Honeypot EssentialsAnton Chuvakin
Web Security: What's wrong, and how the bad guys can break your websiteWeb Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your websiteAndrew Sorensen
Offensive Security basics  part 2Offensive Security basics  part 2
Offensive Security basics part 2wharpreet
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNorth Texas Chapter of the ISSA
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1wharpreet

What's hot(19)

Similar to QAing the security way!

Threat Modeling for Web Applications (and other duties as assigned)Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Mike Tetreault
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksAsep Sopyan
Secure coding guidelinesSecure coding guidelines
Secure coding guidelinesZakaria SMAHI
01 01
01 Jadavsejal
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdfKunjJoshi14
13.02   Network Security13.02   Network Security
13.02 Network SecurityAnjan Mahanta

Recently uploaded

Co-creating with UX and Software RabobankCo-creating with UX and Software Rabobank
Co-creating with UX and Software RabobankSimonedeGijt
Freight Management System Freight Management System
Freight Management System Freightoscope
The Never Landing Stream with HTAP and StreamingThe Never Landing Stream with HTAP and Streaming
The Never Landing Stream with HTAP and StreamingTimothy Spann
MicroK8s 1.28 - MicroCeph on MicroK8s.pdfMicroK8s 1.28 - MicroCeph on MicroK8s.pdf
MicroK8s 1.28 - MicroCeph on MicroK8s.pdfKonstantinos Tsakalozos
Tracking user activity logs using Loggastic #ApiPlatformConTracking user activity logs using Loggastic #ApiPlatformCon
Tracking user activity logs using Loggastic #ApiPlatformConPaula Čučuk
Alliance Expedition BattleAlliance Expedition Battle
Alliance Expedition BattleSilver Caprice

QAing the security way!