- 
  
     Changing Security Tool Requirements in the New DevSecOps WorldYashvier Kosaraju Changing Security Tool Requirements in the New DevSecOps WorldYashvier Kosaraju
- 
  
     Twilio’s Bug Bounty Program: Where we are and where we’re goingYashvier Kosaraju Twilio’s Bug Bounty Program: Where we are and where we’re goingYashvier Kosaraju
- 
  
     Preventing Attacks Using HTTP HeadersYashvier Kosaraju Preventing Attacks Using HTTP HeadersYashvier Kosaraju
- 
  
     Can The Real Codeowners Please Stand Up? Code Provenance at ScaleLaxman Eppalagudem Can The Real Codeowners Please Stand Up? Code Provenance at ScaleLaxman Eppalagudem