Channel Avatar

Secure Code Warrior @UCGXOkj26t4wItqf_BAt3W0Q@youtube.com

0 subscribers - no pronouns :c

Secure Code Warrior makes secure coding a positive and engag


00:50
Secure Code Warrior | Devlympics 2022 Opening Ceremony Animation
00:57
Secure Code Warrior Devlympics 2021 Highlights
05:21
Secure Code Warrior Devlympics 2021 kickoff with founders Pieter Danhieux and Matias Madou
01:17
Devylmpics 2021 opening animation | Secure Code Warrior
11:40
Mean time to update: The best metric you’ve never heard of | Sal Kimmich Sonatype | Devlympics
08:56
“Devs vs. Appsec” Solving the eternal secure coding conflict | Datacom | Devlympics
09:42
Securing software while getting normal work done | Erik Costlow | Devlympics
05:42
Code, the final frontier with Klaus E. Klingner at Allianz Technology SE | Devlympics
12:57
Shifting security left, right, up, down, and everywhere at Atlassian with Alice White | Devlympics
11:22
Putting security first to shape his career and mind - Leaders in DevSec with Prajwal Shetty
10:40
Scaling Appsec through champion programs | Leaders in DevSec with Yalda Khosroshahi
11:32
Developing a passion for cybersecurity | Leaders in DevSec with Lexi Condon
02:27
Server-Side Request Forgery | Secure Code Warrior
03:03
Winning Stakeholder Engagement for your Security Program | Leaders in AppSec Event London
01:07
Unleashing security champions at Nelnet | Warrior Insider | Secure Code Warrior
00:49
Embracing secure coding at Nelnet | Warrior Insider | Secure Code Warrior
02:00
Creating a security culture at Nelnet | Warrior Insider | Secure Code Warrior
02:05
Sick of the security compliance headache?
01:56
Sick of the same recurring vulnerabilities in your code?
01:00
Developer security training at Woolworths Group | Customer testimony | Secure Code Warrior
04:31
Ticker NEWS: Interview with Pieter Danhieux, CEO of Secure Code Warrior
02:47
Case study | How Zip Pay uses secure coding tournaments to engage and upskill developers
00:44
Why the Australian Bureau of Statistics is investing in secure coding | Secure Code Warrior
01:14
Delivering cybersecurity developer training with contextual learning at Contrast | Warrior Insider
00:58
Warrior Insider: Contrast | Deliver cybersecurity developer training with contextual learning Part 2
00:34
Deliver cybersecurity developer training with contextual learning at Contrast | Warrior Insider
00:42
Cameron Marsland, Customer Success | Secure Code Warrior
02:11
Secure Code Warrior | Secure coding tournament with Zip
03:41
Secure Code Warrior Learning Platform Walk Through
51:24
Secure Code Warrior | The Razorthorn Interview Series with Stephen Allor
00:56
Secure Code Warrior | Fatemah Beydoun in the World's Greatest Shave
04:22
Shifting from Reaction to Prevention | Secure Code Warrior
01:36
Why cybersecurity matters when scaling your business | Warrior insider with Selligent
00:44
Warrior Insider: Selligent | Why cybersecurity matters when scaling your business | Part 2
00:48
Warrior Insider: Selligent | Why cybersecurity matters when scaling your business | Part 1
01:13
US Government Executive Order Cybersecurity - Pieter Danhieux, Secure Code Warrior CEO, discusses.
13:19
Secure Code Warrior 'starts left' in the software development process.
08:49
Run IntelliJ IDE in Continuous Integration and Command Line
04:51
Convert Java System.out.println to use a Logger - automatically with Sensei
02:39
What is Sensei? Overview Demo
04:23
How To Automatically Amend Java Annotations - add JUnit @Disabled description with Sensei
02:09
Coders Conquer Security OWASP Top 10 API Series: Improper Permissions
02:15
Coders Conquer Security OWASP Top 10 API Series: Missing Object Level Access Control
01:50
Coders Conquer Security OWASP Top 10 API Series: Security Misconfiguration (Debug Features Enabled)
02:16
Coders Conquer Security OWASP Top 10 API Series: Broken Authentication
02:23
Coders Conquer Security OWASP Top 10 API Series: Improper Assets Management
02:57
Coders Conquer Security OWASP Top 10 API Series: OS Injection
03:41
Coders Conquer Security OWASP Top 10 API Series: NOSQL Injection
03:36
Coders Conquer Security OWASP Top 10 API Series: SQL Injection
01:57
Coders Conquer Security OWASP Top 10 API Series: Security Misconfiguration
02:04
Coders Conquer Security OWASP Top 10 API Series: Mass Assignment
02:01
Coders Conquer Security OWASP Top 10 API Series: Lack of Resources and Rate Limiting
01:55
Coders Conquer Security OWASP Top 10 API Series: Excessive Data Exposure
03:40
Coders Conquer Security OWASP Top 10 API Series: Insufficient Logging and Monitoring
04:02
Coders Conquer Security OWASP Top 10 API Series: Missing Function Level Access Control
01:25
From Dev to DevSec: Transparency
01:31
From Dev to DevSec: The Right Tools for the Job at Hand
01:30
From Dev to DevSec: Building Skills at Work
01:40
From Dev to DevSec: Create a Highly Supportive Environment
01:43
From Dev to DevSec: Security is a Shared Responsibility