![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64c78b888334d986d587bcf5_channel%20cover.jpeg)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b4d92aba81bdeeb5bed5fa_S02EP54_-_Andrew_Krug.png)
Breaking and Building Serverless Application Security
Nov 21, 2021
•
DataDog
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b4d941492cef83cc5e04a7_S02EP53_-_Ran_Ribenzaft.png)
Challenges with Building Serverless Applications at Scale
Nov 14, 2021
•
Epsagon
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b4d9370f2f2b746e320b22_S02EP52_-_John_Zoella.png)
Security Governance and Compliance in Serverless Applications
Nov 7, 2021
•
Seiso
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b8fa4d2d6ba0d891d04_S01EP19-_Abhay_Bhargav.png)
SERVERLESS SECURITY BEST PRACTICES
Apr 26, 2020
•
we45