security
Mapping the Attack Surface from the Inside
Mercari’s passkey adoption
Bucket full of secrets – Terraform exfiltration
Supply-Chain Security: Evaluation of Threats and Mitigations
Fraud, How do we handle it ?
Restructuring the Kubernetes Threat Matrix and Evaluating Attack Detection by Falco
Who Watches the Watchmen? Keeping an Eye on Our Monitoring Systems
The Mobile Attack Surface
Securing the SDLC at Mercari: Solutions for Automated Code Scanning
Suspecting the Unsuspected. Extracting and Analyzing Log Anomalies