Immunizing software from attack using DevOps tools: a demonstration by RunSafe Security
Using Binary Analysis to Quantify Potential Zero-Day Risk with Doug Britton
What if You Could Protect Software Before the Next Zero Day Is Discovered? Zero-day vulnerabilities are the hidden threat lurking in every software stack. In this THREATCON1 session, Doug Britton explains how organizations can use binary analysis to quantify potential...



