Surviving the CVE Firehose: Strategies for Open Source Product Security

Surviving the CVE Firehose: Strategies for Open Source Product Security

Linux Foundation via YouTube Direct link

Chromium Bug Bounty

11 of 23

11 of 23

Chromium Bug Bounty

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Surviving the CVE Firehose: Strategies for Open Source Product Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What is a security vulnerability
  3. 3 The Venn diagram
  4. 4 What are security vulnerabilities
  5. 5 Is it secure
  6. 6 Is it compromised
  7. 7 Is it vulnerable
  8. 8 WordPress vulnerability
  9. 9 Traditional hacker
  10. 10 Money
  11. 11 Chromium Bug Bounty
  12. 12 How Much Do They Pay
  13. 13 What Is A CVE
  14. 14 The Silent Bug Fix
  15. 15 How Does This Help Me
  16. 16 Include An Update Mechanism
  17. 17 How To Track Vulnerabilities
  18. 18 Ikey Aikido Dirty
  19. 19 Attackable Surface Area
  20. 20 Privilege
  21. 21 Code Reviews
  22. 22 Should an outside company seek outside expertise
  23. 23 Are there plans to put CVE messages in kernel commits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.