Security
Mercari’s passkey adoption
Bucket full of secrets – Terraform exfiltration
The Art of the Security Double Play: How Mercari Combines Internal Audits and Custom CodeQL Queries to Keep Systems Safe
Follow the White Rabbit: Finding The Women With The Red Dress In A Torrent of Event Logs
Supply-Chain Security: Evaluation of Threats and Mitigations
Fraud, How do we handle it ?
Restructuring the Kubernetes Threat Matrix and Evaluating Attack Detection by Falco
Building secure web apps using Web Workers
Decrypting Cryptography Basics: Practical Exercises to Fathom Theory (Part 1)
Who Watches the Watchmen? Keeping an Eye on Our Monitoring Systems