Luís Ventura

Answering the Million Dollar Question: Why did I Break Production?

How did a tiny performance lag uncover a massive security backdoor? Learn why human oversight remains your most critical defense against failure.

Answering the Million Dollar Question: Why did I Break Production?
#1about 4 minutes

Understanding the complexity of modern software development

Modern software is complex due to large codebases, external dependencies, changing requirements, and distributed teams.

#2about 6 minutes

How human error and assumptions lead to outages

Real-world examples show how simple mistakes, phishing attacks, and incorrect assumptions can cause major system failures.

#3about 5 minutes

Managing infrastructure complexity and planning for scale

Over-provisioning, under-provisioning, and failing to anticipate user load can lead to costly outages and poor performance.

#4about 1 minute

How to anticipate future-proofing issues in code

The "Gangnam Style" integer overflow illustrates why developers must consider data type limits and long-term system behavior.

#5about 5 minutes

Finding leaked secrets with static analysis tools

A live demo shows how to use a tool like Trivy to automatically scan infrastructure-as-code files for exposed credentials.

#6about 4 minutes

Scanning for vulnerable dependencies and IaC misconfigurations

Tools like Trivy and Checkov can automatically scan package manifests and configuration files for known vulnerabilities and security issues.

#7about 2 minutes

Using linters to catch common code-level bugs

A demonstration of ESLint shows how linters can identify common programming mistakes like scope errors or missing break statements.

#8about 1 minute

Recognizing the limitations of automated security tools

Automated tools are helpful but cannot replace the critical thinking and context provided by manual code reviews and comprehensive testing.

#9about 1 minute

The critical role of human observation in security

The discovery of the XZ Utils backdoor highlights that human intuition and detailed investigation remain essential for finding sophisticated threats.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
DC
Daniel Cranney
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
Inside last week’s Dev Digest 194 . 🧠 Learn how to become an AI-native software engineer 🤷‍♂️ How can you stand out when anyone can build anything? 👂 Whisper Leak allows listening to encrypted chats 🐝 What’s new the OWASP2025 Top Ten List 🙅‍♀️ Curse...
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
DC
Daniel Cranney
Dev Digest 196: AI Killed DevOps, LLM Political Bias & AI Security
Inside last week’s Dev Digest 196 . ⚖️ Political bias in LLMs 🫣 AI written code causes 1 in 5 security breaches 🖼️ Is there a limit to alternative text on images? 📝 CodeWiki - understand code better 🟨 Long tasks in JavaScript 👻 Scare yourself into n...
Dev Digest 196: AI Killed DevOps, LLM Political Bias & AI Security
DC
Daniel Cranney
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms
Inside last week’s Dev Digest 188 . 🤖 GitHub Copilot CLI is now in public review 💻 Microsoft is bringing ‘vibe working’ to office apps 🎣 Attackers abuse AI tools to generate captchas in fishing attacks ⚠️ When LLMs autonomously attack 🧠 Common cause...
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms

From learning to earning

Jobs that call for the skills explored in this talk.