DevOps, Hardware Security, Bug bounties

Google 2FA Cloning, Speed vs. Security, & “Hack The Army” Bug Bounty 3.0 – ASW #136

January 11, 2021

Significant source code leak from misconfigured repo, side-channel attack on hardware authentication keys, a third bug bounty for the U.S. Army, the cost of poor software quality, the benefits of DevOps approaches to building systems. Visit https://www.securityweekly.com/asw for all the latest episodes!

Full Episode Show Notes

Google 2FA Cloning, Speed vs. Security, & "Hack The Army" Bug Bounty 3.0

None

Hosts

[caption id="attachment_210" align="alignleft" width="120"]John Kinsella John Kinsella - Chief Architect[/caption] [caption id="attachment_210" align="alignleft" width="120"]Matt Alderman Matt Alderman - Executive Director[/caption] [caption id="attachment_210" align="alignleft" width="120"]Mike Shema Mike Shema - Product Security Lead[/caption]

Announcements

  • Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, and join our Discord Server!

  • If you missed Security Weekly Unlocked, you can now access all of the content on-demand, whether you registered before the live event or not, by visiting https://securityweekly.com/unlocked and clicking either the button to register or the button to login!

[audio src="http://traffic.libsyn.com/sw-all/ASW_136_-_AppSec_News-0_converted.mp3"]
prestitial ad