Session
Next, next, done, and you are secure, right? – Wrong!
Your application may be extremely secure but if the operating system or 3rd party applications are not, the attacker will never notice or care and if you have ever installed anything, you know that the easiest approach is to simply click “Next”, “Next” and “Done” and take a coffee break. But you know how secure (or rather insecure) this is and what could be done to secure it!
Watch how to create a secure golden image in a CD/CI pipeline – You will never do anything else!

Thomas Ljungberg Kristensen
Security Advisor - WelcomeSecurity
Silkeborg, Denmark
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top