CROC Talks - Threat Models, Cloud Tools, and Security Tales - Special Guest: Kat Traxler

CROC Talks - Threat Models, Cloud Tools, and Security Tales - Special Guest: Kat Traxler

Service Agents and the Search for Transitive Access in GCP ~ Kat TraxlerПодробнее

Service Agents and the Search for Transitive Access in GCP ~ Kat Traxler

Ferocious Kitten: 6 Years of Covert Surveillance in the Middle EastПодробнее

Ferocious Kitten: 6 Years of Covert Surveillance in the Middle East

The Cloud is Calling - Staying Secure with Kassia CliffordПодробнее

The Cloud is Calling - Staying Secure with Kassia Clifford

ThreatLocker - New Office PreviewПодробнее

ThreatLocker - New Office Preview

Intro to Threat Modeling in the Cloud - Paige Cruz, ChronosphereПодробнее

Intro to Threat Modeling in the Cloud - Paige Cruz, Chronosphere

Cyber Security Interview Questions You Must Know (Part 1)Подробнее

Cyber Security Interview Questions You Must Know (Part 1)

Free Security Tools Everyone Should UseПодробнее

Free Security Tools Everyone Should Use

Tell Me About Yourself | Best Answer (from former CEO)Подробнее

Tell Me About Yourself | Best Answer (from former CEO)