Channel Avatar

AppSecEngineer @UCzeWGp3WdLetPN7Lhph6S6g@youtube.com

7.3K subscribers - no pronouns :c

Exclusive Full-Stack Security training from we45. Learn with


EVERY Major Security Regulation for Healthcare Companies Why is Security in Healthcare So Regulated? Healthcare Security Regulations are Life or Death Fixing Broken YAML Files in Java Spring Boot Insecure Deserialization in Java Spring Boot Apps Best Way to Store Passwords in Java Spring Boot Apps Securely Store Your Passwords in Java Spring Boot Apps Fixing BOLA/IDOR Flaws in Java Spring Boot! BOLA/IDOR Vulnerabilities in Java Spring Boot! Healthcare Breaches Can KILL Your Company AI/LLM security for HIPAA compliance?? For HIPAA compliance, you need DevSecOps Cloud Security for HIPAA Compliance Threat Modeling in Your SDLC #llm #genai #aisecurity Why is Threat Modeling So Important? #llm #genai #aisecurity Why MCP is So Popular for AI Agents #genai #llm #appsec MCP is Next Big Thing for AI Agents #genai #llm #appsec Why AI Agents Are NOT Always the Solution #genai #llm #appsec Why is Everyone Talking About AI Agents? #genai #llm #appsec What Are Secure Defaults_ appsec #securecoding.mp4 How the Best Teams Do Secure Defaults #appsec #securecoding Secure Defaults for Ruby and Django! #appsec #securecoding Why You Need Secure Defaults for SAST #appsec #securecoding 3 Tips for Implementing Secure Defaults #appsec #securecoding CISA Guidelines for Secure Defaults #appsec #securecoding Why Secure Default is Such a Game-Changer #appsec #securecoding Developer Should NOT Have to Deal with Insecure Libraries #appsec #securecoding How Python Fixed their Biggest Vulnerability #appsec #securecoding What Are Secure Defaults? #appsec #securecoding Using CrewAI Agent to Build Vulnerable Apps for Testing Compromising Azure VMs with Injection Attacks #appsec #cloudsecurity #aws Multi-Cloud is the New Normal #appsec #cloudsecurity #aws PDF Generator Apps Vulnerable to SSRF Attacks? #appsec #cloudsecurity #aws Will AI Replace Humans in Application Security? #genai #llm Why Threat Modeling is Essential for Your AppS #genai #llm How to Use LLMs for Threat Modeling #genai #llm Biggest Security Issues with RAG Apps #llm #chatgpt #appsec The 3 Types of LLM Apps You Can Build #llm #chatgpt #appsec How to Secure Microsoft Copilot AI #infosec #windows11 AWS Resource Control Policies Explained #aws #cloud The 2 Things Holding Back Your Security Training Program #infosec #appsec Why Your Company's Security Training is BORING #infosec #appsec Why Secure Coding Training in NOT Enough #infosec #appsec How to Get PCI-DSS Compliant: A 12 Steps Guide | Part 4 How to Get PCI-DSS Compliant: A 12 Steps Guide | Part 3 How to Get PCI-DSS Compliant: A 12 Step Guide | Part 2 How to Get PCI-DSS Compliant: A 12 Step Guide | Part 1 How to Meet PCI DSS v4.0 Requirements