
Week in Review: Okta explains hack, Google Calendar as C2, Selling military data
Cybersecurity Headlines
00:00
Manipulating Source Code and Trustworthiness of Applications
This chapter explores the risks associated with manipulating source code, highlighting the trustworthiness concerns surrounding applications developed by individuals. It also delves into the vulnerabilities of developers and the significance of networking in the cybersecurity industry.
Play episode from 22:41
Transcript


