1:21:51 | May 22, 2022
1:31:38 | May 08, 2022
1:07:44 | March 13, 2022
1:50:11 | February 13, 2022
02:35:49 | January 16, 2022
01:57:17 | January 09, 2022
02:08:27 | January 02, 2022
02:30:00 | December 19, 2021
2:28:53 | December 12, 2021
2:00:46 | October 03, 2021
2:05:10 | September 19, 2021
1:33:34 | September 05, 2021
2:47:43 | July 04, 2021
01:19:09 | June 06, 2021
2:02:50 | May 23, 2021
2:17:34 | May 16, 2021
1:56:15 | April 18, 2021
01:46:12 | April 03, 2021
01:52:58 | March 14, 2021
01:47:16 | February 21, 2021
02:20:34 | February 14, 2021
01:17:01 | February 07, 2021
02:00:13 | January 31, 2021
01:52:14 | January 17, 2021
02:44:00 | December 13, 2020
02:38:56 | November 22, 2020
02:46:57 | October 11, 2020
02:10:54 | September 19, 2020
02:28:04 | June 21, 2020
02:37:04 | June 14, 2020
01:19:40 | June 13, 2020
02:13:00 | May 25, 2020
02:43:43 | April 20, 2020
01:57:56 | April 12, 2020
01:35:34 | April 08, 2020
02:01:03 | March 14, 2020
01:44:03 | January 12, 2020
1:28:48 | July 31, 2019
1:09:27 | June 02, 2019
1:19:23 | May 25, 2019
1:27:53 | May 18, 2019
1:05:23 | May 11, 2019
1:48:05 | March 28, 2019
1:09:42 | March 21, 2019
1:27:22 | January 24, 2019
1:19:55 | November 14, 2018
1:45:48 | September 27, 2018
2:00:40 | June 09, 2018
1:46:09 | June 02, 2018
2:46:10 | May 26, 2018
2:00:13 | May 19, 2018
May 16, 2021
In this episode of GeeksBlabla, we discuss with our community members about software security, what is software security, tricks for effective and productive learning.
0:00:00 - Introduction and welcoming
0:05:00 - What is software security
0:11:00 - A bit of history about cybersecurity
0:24:00 - Is there a secure system? why secure systems?
0:32:00 - Risk & Risk Assessment
0:48:00 - What is OWASP?
0:51:00 - OWASP top 10 - 2021
0:51:00 - OWASP top 10 - 2021: Injection
0:55:00 - OWASP top 10 - 2021: Broken authentication
1:01:00 - Sensitive data exposure - What is data leakage? What are the factors that can cause data leakage?
1:08:00 - XML external entities (XXE)
1:15:00 - Security misconfigurations
1:49:00 - Cross site scripting (XSS) - discuss vs CSRF
1:56:00 - What is the 80/20 rule of networking?
2:00:00 - What are personal traits you should consider protecting data?
2:05:00 - Famous moroccan hackers and their achievements
2:09:00 - GRAALVM security
2:16:00 - Conclusion, Wrap up and goodbye