Security19 Videos

J-Fall Virtual 2020: Brian Vermeer – Securing Containers by Breaking in

There’s no better way to understand container security than seeing some live hacking! This session introduces the state of docker security by reviewing vulnerabilities in Docker images and their impact on applications and demonstrates via hands-on live hacking. This session further provides the audience with security best practices when building docker container images, and each […]

J-Spring Digital: Brian Vermeer – Know thy neighbours: dependency management done right

We all love scaffolders like Spring Boot Initialzr. It creates a brand new app with all the latest versions of the libraries we need to get going, enabling us to build awesome applications quickly. But after creating our initial application who is responsible for the dependency management and what happens over time when new features […]

J-Spring 2019: Emond Papegaaij – Oauth2 demystified

Almost every developer will have to face this at some point in his or her career: authorization with OAuth2. It doesn’t matter if you build mobile apps, web applications or even develop for embedded systems in the IoT, everybody seems to use OAuth2 nowadays. But how does this protocol work and what’s up with all […]

J-Spring 2019: Brian Vermeer – Live exploiting your open source dependencies

Today, almost all software heavily relies on the use of third-party dependencies. While open source modules are undoubtedly awesome, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. Including the wrong package can introduce severe vulnerabilities, exposing your application and your user’s […]

J-Spring 2019: Adam Bien – Kickass Apps with Boring Tech: Interactive Hacking #Slideless

What happens, when you focus on the domain and ignore the technology? In this session I will hack a full stack application from microservice backend to WebStandards frontend without any esoteric frameworks, technologies or libraries. Questions are highly welcome and are going to be answered in real time. Bio Adam Adam Bien: Java (EE), Jakarta […]

TEQnation 2019: Erwin de Gier – Building a cloud native Crypto Currency platform with WebFlux

Full title: Building a cloud native Crypto Currency trading platform with Spring WebFlux Using events is a powerful alternative to REST-based communication in microservices. However, it comes with its own challenges: For instance, dealing with eventual consistency, synchronisation of state, and writing code which can handle asynchronous business logic. In this talk we explain how […]

TEQnation 2019: Brian Vermeer – Live exploiting your open source dependencies

Today, almost all software heavily relies on the use of third-party dependencies. While open source modules are undoubtedly awesome, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. Including the wrong package can introduce severe vulnerabilities, exposing your application and your user’s […]

TEQnation 2019: Seth Vargo – Base64 is not encryption – a better story for Kubernetes Secrets

Secrets are a key pillar of Kubernetes’ security model, used internally (e.g. service accounts) and by users (e.g. API keys), but did you know they are stored in plaintext? That’s right, by default all Kubernetes secrets are base64 encoded and stored as plaintext in etcd. Anyone with access to the etcd cluster has access to […]

TEQnation 2019: Julie Matviyuk – Friendly fire: how security software messes up

Have you ever wondered why, in the era of Deep Learning and hover-boards*, security software can still mess up? Why is it so challenging to distinguish clean files from malware? Here are 10 simple tips to make sure your software won’t be blasted off customers’ machines. *(they don’t really hover) For the past 10 years, […]

Future Tech 2019: Brenno de Winter – Resilience starts with code. Any attack starts with code

Bad code installed and smart exploits created. As soon as espionage or other APT’s are involved vague terms, lack of understanding and especially fear kick in. Common sense dictates other behavior. In this talk we focus on what we can do, what we should do and especially what you can do. Surviving digital xenophobia begins with replacing […]