InfoQ Homepage Presentations Applications Through an Attacker’s Lens
Applications Through an Attacker’s Lens
Summary
Michael Coates explores how attackers target, analyze and compromise applications. Coates discusses recent high profile compromises and deconstructs them to understand exactly what went wrong and how to prevent these weaknesses in your applications.
Bio
Michael Coates is the Trust & Information Security Officer at Twitter and also a member of the global board of directors for OWASP, a nonprofit organization providing resources and communities to increase application security.
About the conference
Software is Changing the World. QCon empowers software development by facilitating the spread of knowledge and innovation in the developer community. A practitioner-driven conference, QCon is designed for technical team leads, architects, engineering directors, and project managers who influence innovation in their teams.
This content is in the QCon Software Development Conference topic
Related Topics:
Sponsored Content
-
Related Editorial
-
Related Sponsors
-
Popular across InfoQ
-
AWS Introduces ECS Managed Instances for Containerized Applications
-
Producing a Better Software Architecture with Residuality Theory
-
GitHub Introduces New Embedding Model to Improve Code Search and Context
-
Google DeepMind Introduces CodeMender, an AI Agent for Automated Code Repair
-
Building Distributed Event-Driven Architectures across Multi-Cloud Boundaries
-
Elena Samuylova on Large Language Model (LLM)-Based Application Evaluation and LLM as a Judge
-