Security Challenges - An Introduction |
Towards a unified way of describing threat models |
ZAP working session - automation |
ZAP working session - the HUD |
Zap - How to use it |
Security Challenges - Analysis, Analogies |
Secrets Management |
Application Security Verification Standard |
Scaling API Security |
Writing security tests to confirm vulnerabilities and fixes |
Security Challenges - Collate others' strategies and assumptions |
Customising the Chaos Engineering Toolkit |
Security Challenges - Next step |
Real world Chaos Engineering |