Exploit Analysis: Sign-in With Apple

(18 minutes)

Get a technical analysis of a recently discovered mobile exploit. Eric Castro from Data Theorem breaks down how "Sign-in with Apple" was bypassed, which would allow hackers to take over a user's account in this week’s live demo.

Top 6 Security Needs for APIs and Serverless Apps

On-Demand Webinar (36 min)

Securing APIs across Amazon Lambda, Google Cloud Functions and Azure Functions