<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Java security tutorials and videos</title>
	<atom:link href="https://www.java-tv.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.java-tv.com</link>
	<description>Java, Groovy, Spring, Eclipse, Hibernate Tutorials and Videos</description>
	<lastBuildDate>Tue, 22 Nov 2022 17:41:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Defensive Coding Bootcamp</title>
		<link>https://www.java-tv.com/2022/11/22/defensive-coding-bootcamp/</link>
					<comments>https://www.java-tv.com/2022/11/22/defensive-coding-bootcamp/#comments</comments>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Tue, 22 Nov 2022 17:41:47 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.java-tv.com/?p=4932</guid>

					<description><![CDATA[<p>Do you build Java systems that can be hacked? Want to lower those odds? In this presentation, you will learn the basics of security vulnerabilities and evasive coding maneuvers that can make your software more secure, every time. Geared for developers of all skill levels, this code-centric talk presents code &#8230;</p>
The post <a href="https://www.java-tv.com/2022/11/22/defensive-coding-bootcamp/">Defensive Coding Bootcamp</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
					<wfw:commentRss>https://www.java-tv.com/2022/11/22/defensive-coding-bootcamp/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Securing Java Containers</title>
		<link>https://www.java-tv.com/2022/06/15/securing-java-containers/</link>
					<comments>https://www.java-tv.com/2022/06/15/securing-java-containers/#comments</comments>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Wed, 15 Jun 2022 16:33:20 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.java-tv.com/?p=4915</guid>

					<description><![CDATA[<p>So you built your Java apps and containerized them, great job! But what does it take to secure a container? Are you sure you&#8217;re following all the best practices to build container images correctly? What are the threats you are not mitigating in a running container? There is no better &#8230;</p>
The post <a href="https://www.java-tv.com/2022/06/15/securing-java-containers/">Securing Java Containers</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
					<wfw:commentRss>https://www.java-tv.com/2022/06/15/securing-java-containers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Top 10 Vulnerabilities of Java Apps</title>
		<link>https://www.java-tv.com/2018/09/05/top-10-vulnerabilities-of-java-apps/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Wed, 05 Sep 2018 15:19:23 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=4655</guid>

					<description><![CDATA[<p>This session discusses some of the most common vulnerabilities found in Java apps. It breaks them down and shows how simple code can exploit them. We&#8217;ll look at examples in the wild that have been exposed, some more famously than others, before showing you how to guard against these important &#8230;</p>
The post <a href="https://www.java-tv.com/2018/09/05/top-10-vulnerabilities-of-java-apps/">Top 10 Vulnerabilities of Java Apps</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Java Security Architecture Demystified</title>
		<link>https://www.java-tv.com/2017/04/05/java-security-architecture-demystified/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Wed, 05 Apr 2017 14:27:17 +0000</pubDate>
				<category><![CDATA[Software Architecture]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=4449</guid>

					<description><![CDATA[<p>This presentation provides an overview of the security architecture of the Java platform in terms of its evolution throughout the versions of the JDK up to JDK 9 and beyond. The security utilities that fullfill the security portfolio of the JDK will be discussed briefly along with several guidelines in &#8230;</p>
The post <a href="https://www.java-tv.com/2017/04/05/java-security-architecture-demystified/">Java Security Architecture Demystified</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Secure Your Java EE Application</title>
		<link>https://www.java-tv.com/2015/12/09/secure-your-java-ee-applications/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Wed, 09 Dec 2015 17:56:16 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[java ee]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=3566</guid>

					<description><![CDATA[<p>Security in Java EE applications is a never-ending story. Most of the knowledge about how to build secure applications is derived from knowledge and experience. And we&#8217;ve all done the same mistakes every Java EE developer does over and over again. But how to solve the real business requirements behind &#8230;</p>
The post <a href="https://www.java-tv.com/2015/12/09/secure-your-java-ee-applications/">Secure Your Java EE Application</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Securing Edge-to-Enterprise Systems with Java</title>
		<link>https://www.java-tv.com/2014/05/26/securing-edge-to-enterprise-systems-with-java/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Mon, 26 May 2014 19:31:09 +0000</pubDate>
				<category><![CDATA[Software Architecture]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=3252</guid>

					<description><![CDATA[<p>The development of new edge-to-enterprise systems brings exciting new opportunities, but it also introduces the security conundrum of how to ensure against attack and intrusion while maintaining flexibility, over-the-air programmability, and reduced costs. This presentation discusses how Java is ideally placed to address this conundrum by providing the foundations of &#8230;</p>
The post <a href="https://www.java-tv.com/2014/05/26/securing-edge-to-enterprise-systems-with-java/">Securing Edge-to-Enterprise Systems with Java</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>10 Minute Java Security</title>
		<link>https://www.java-tv.com/2014/02/27/10-minute-java-security/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Thu, 27 Feb 2014 20:24:59 +0000</pubDate>
				<category><![CDATA[Software Architecture]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=3171</guid>

					<description><![CDATA[<p>Learn everything you need to secure your Java application in 10 minutes! Well, not quite, but hopefully by the end of this talk you should undestand why you should spend more than 10 minutes on the security your next Java web application. Event: http://nighthacking.com/</p>
The post <a href="https://www.java-tv.com/2014/02/27/10-minute-java-security/">10 Minute Java Security</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Security for Java Embedded Devices</title>
		<link>https://www.java-tv.com/2014/01/14/security-for-java-embedded-devices/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Tue, 14 Jan 2014 23:05:06 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=3109</guid>

					<description><![CDATA[<p>Java security technology has different considerations for embedded devices versus desktop and server systems, including a limited amount of memory, a limited amount of storage space, and low-power processors. This session shows developers what to consider and how to program differently when using digital signing, encryption, authentication, and secure connections &#8230;</p>
The post <a href="https://www.java-tv.com/2014/01/14/security-for-java-embedded-devices/">Security for Java Embedded Devices</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Security Vulnerabilities in OpenSource Java Libraries</title>
		<link>https://www.java-tv.com/2013/09/03/security-vulnerabilities-in-opensource-java-libraries/</link>
					<comments>https://www.java-tv.com/2013/09/03/security-vulnerabilities-in-opensource-java-libraries/#comments</comments>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Tue, 03 Sep 2013 20:31:05 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=2979</guid>

					<description><![CDATA[<p>Everyone knows the importance of software security in the Java world. A successful attack against an application can result in a wide spectrum of negative consequences, including the cost of a business interruption, the cost of stolen or compromised data, and a damage to the reputation. Considering a huge and &#8230;</p>
The post <a href="https://www.java-tv.com/2013/09/03/security-vulnerabilities-in-opensource-java-libraries/">Security Vulnerabilities in OpenSource Java Libraries</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
					<wfw:commentRss>https://www.java-tv.com/2013/09/03/security-vulnerabilities-in-opensource-java-libraries/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Java Secure Development Best Practices</title>
		<link>https://www.java-tv.com/2013/07/22/java-secure-development-best-practices/</link>
		
		<dc:creator><![CDATA[java-tv.com]]></dc:creator>
		<pubDate>Mon, 22 Jul 2013 21:04:38 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.java-tv.com/?p=2923</guid>

					<description><![CDATA[<p>Learn the best practices to avoid introducing security vulnerabilities into your Java application and how to discover those that may have already found their way in. Over the several years studies have shown that 70% of exploitable vulnerabilities occur in application code, so we will discuss how these can be &#8230;</p>
The post <a href="https://www.java-tv.com/2013/07/22/java-secure-development-best-practices/">Java Secure Development Best Practices</a> first appeared on <a href="https://www.java-tv.com">Java Software Development Tutorials and Videos</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
