Security in Serverless world

Speaker at Self
May. 10, 2018
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
Security in Serverless world
1 of 158

More Related Content

What's hot

Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperAjin Abraham
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes BackBSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes BackLacework
Debunking serverless mythsDebunking serverless myths
Debunking serverless mythsYan Cui
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...Lacework
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Ajin Abraham

Similar to Security in Serverless world

DevSecCon London 2018: Security in the serverless worldDevSecCon London 2018: Security in the serverless world
DevSecCon London 2018: Security in the serverless worldDevSecCon
Security in serverless worldSecurity in serverless world
Security in serverless worldYan Cui
Security in serverless worldSecurity in serverless world
Security in serverless worldYan Cui
Security in serverless world (get.net)Security in serverless world (get.net)
Security in serverless world (get.net)Yan Cui
Serverless security: defence against the dark artsServerless security: defence against the dark arts
Serverless security: defence against the dark artsYan Cui
Serverless security: defense against the dark artsServerless security: defense against the dark arts
Serverless security: defense against the dark artsYan Cui

More from Yan Cui

How to win the game of trade-offsHow to win the game of trade-offs
How to win the game of trade-offsYan Cui
How to choose the right messaging serviceHow to choose the right messaging service
How to choose the right messaging serviceYan Cui
How to choose the right messaging service for your workloadHow to choose the right messaging service for your workload
How to choose the right messaging service for your workloadYan Cui
Patterns and practices for building resilient serverless applications.pdfPatterns and practices for building resilient serverless applications.pdf
Patterns and practices for building resilient serverless applications.pdfYan Cui
Lambda and DynamoDB best practicesLambda and DynamoDB best practices
Lambda and DynamoDB best practicesYan Cui
Lessons from running AppSync in prodLessons from running AppSync in prod
Lessons from running AppSync in prodYan Cui

Recently uploaded

Accelerating Data Science through Feature Platform, Transformers and GenAIAccelerating Data Science through Feature Platform, Transformers and GenAI
Accelerating Data Science through Feature Platform, Transformers and GenAIFeatureByte
How is AI changing journalism? Strategic considerations for publishers and ne...How is AI changing journalism? Strategic considerations for publishers and ne...
How is AI changing journalism? Strategic considerations for publishers and ne...Damian Radcliffe
Salesforce Miami User Group Event - 3rd QuarterSalesforce Miami User Group Event - 3rd Quarter
Salesforce Miami User Group Event - 3rd QuarterSkyPlanner
"From Orchestration to Choreography and Back", Yevhen Bobrov "From Orchestration to Choreography and Back", Yevhen Bobrov
"From Orchestration to Choreography and Back", Yevhen Bobrov Fwdays
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala "Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala Fwdays

Recently uploaded(20)

Security in Serverless world