31:04 There’s a new sheriff in town dynamic security group recommendations with Grouper and Dredge All Hacking Cons
39:50 Differences Between Web Application Scanning Tools when Scanning for XSS and SQLi All Hacking Cons
37:13 Leveraging Blockchain for Identity and Authentication in IoT is good for Security All Hacking Cons
50:24 Bug Bounty Programs Successfully Controlling Complexity and Perpetual Temptation All Hacking Cons