Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Importance of Intelligence in Protecting Digital and Human Assets

Richard Cassidy shares that in today's world of cyber security, intelligence is crucial in protecting both our digital and human assets. He delves into the sources of intelligence that allow us to safeguard our resources and make sure that transactions go smoothly. Guest Bio(s): Richard Cassidy

Let's explore Shell Plugins with 1Password's Engineering team

Join 1Password’s Developer Tools team as we demonstrate Shell Plugins, the feature that enables one-touch authentication to a CLI with biometrics. In this Community Office Hour replay, we demonstrate Shell Plugins, show how to build a plugin and answer questions from the developer community who joined us live. Our panel includes Principal Evangelist Jason Harris, Software Engineer Amanda Crawley and Engineering Lead Simon Barendse.

Building a Safer Learning Environment for K-12 Schools

Cyberattacks targeting our educational institutions impact all of society. They may force schools to close and parents to take time off work for days or weeks at a time. But more insidiously, they cause further disruption to learning, which has already been severely impacted by the pandemic. That means children fail to achieve their potential, which can impact lifetime earnings and gross domestic product (GDP).

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

Is it ODD to Shift Left? Building Elite DevSecOps Performers

In today’s world, customers expect top-notch digital experiences. Apps that are slow, or leak sensitive data, will alienate even the most ardent users. This session will explore the underlying use cases for shifting security and observability left with two emerging practices, DevSecOps and Observability Driven Design.