BT
You are now in FULL VIEW
CLOSE FULL VIEW

Applications Through an Attacker’s Lens
Recorded at:

| by Michael Coates Follow 0 Followers on Dec 18, 2015 |
50:00

Summary
Michael Coates explores how attackers target, analyze and compromise applications. Coates discusses recent high profile compromises and deconstructs them to understand exactly what went wrong and how to prevent these weaknesses in your applications.

Sponsored Content

Bio

Michael Coates is the Trust & Information Security Officer at Twitter and also a member of the global board of directors for OWASP, a nonprofit organization providing resources and communities to increase application security.

Software is Changing the World. QCon empowers software development by facilitating the spread of knowledge and innovation in the developer community. A practitioner-driven conference, QCon is designed for technical team leads, architects, engineering directors, and project managers who influence innovation in their teams.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT