401. | Everything is Terrible Three Perspectives on Building, Configuring, and Securing Software | 0 | |
|
402. | is pavlovian password management the answer lance james | 0 | |
|
403. | Watching Software Run Beyond Defect Elimination 1 4 | 0 | |
|
404. | Simplifying Threat Modeling | 0 | |
|
405. | OWASP HIVE Project Welcome to the Grid | 0 | |
|
406. | If it fits it sniffs Adventures in WarShipping Larry Pesce DerbyCon 4 | 0 | |
|
407. | Scaling Security Assessment at the Speed of DevOps | 0 | |
|
408. | Bypassing Strong Authentication With Passwords | 0 | |
|
409. | Security In Depth When Security Theatre Just Isn't Enough Craig Rumball | 0 | |
|
410. | Can AppSec Training Really Make a Smarter Developer John Dickson | 0 | |
|
411. | The Story behind CVE 2021 34743 by Global4G | 0 | |
|
412. | RATS 20191119 1520 | 0 | |
|
413. | Value Driven Threat Modeling Avi Douglen | 0 | |
|
414. | Toshiyuki Masui EpisoPass Password Management based on Episodic Memories | 0 | |
|
415. | Swathi Joshi Keynote | 0 | |
|
416. | Exhibitor A Risk based Approach to API Security Tim De Boeck | 0 | |
|
417. | A Series of Unfortunate Events Where Malware Meets Murphy by M van Ommeren | 0 | |
|
418. | AirBnBeware Short Term Rentals Long Term Pwnage | 0 | |
|
419. | Flagship Projects OWASP Dependency Track Steve Springett | 0 | |
|
420. | Tell Me Who You Are and I Will Tell You Your Lock Pattern Marte Løge | 0 | |
|
421. | Non traditional Encryption Problems And Solutions Chuck Willis | 0 | |
|
422. | Damien CAUQUIL Securite des tickets de metro FR | 0 | |
|
423. | Simon Bennetts Keynote | 0 | |
|
424. | RightsCon After Dark Celebrating Pride with Kai Mata | 0 | |
|
425. | State of SSL on the Internet 2010 Survey Results and Conclusions 1 3 | 0 | |
|
426. | Passwords 2015 Interview with Zoë Rose | 0 | |
|
427. | TOTPs Are Not As Secure As You Might Believe Santiago Kantorowicz | 0 | |
|
428. | Finding And Exploiting Bugs In TLS Libraries Used By Smart UPS Devices by Yuval Sarel and Gal Levy | 0 | |
|
429. | Ten DevSecOps Culture Failures Chris Romero | 0 | |
|
430. | Le grand saut en Cybersécurité Danny Boivin | 0 | |
|
431. | Smart Phones with Dumb Apps Threat Modeling for Mobile Applications 2 3 | 0 | |
|
432. | Attacking masterkeyed systems the easy way Jos Weyers | 0 | |
|
433. | MLSec Going Deeper Abraham Kang | 0 | |
|
434. | OpenQA with the JDP data analyses framework Bug tag propagation on 2M test results using Julia | 0 | |
|
435. | Falling Water Vulnerability disclosure for Medical Devices Veronica Schmitt | 0 | |
|
436. | ICANN Leadership at Buenos Aires Meeting | 0 | |
|
437. | P0w3d for Botnet CnC 1 3 | 0 | |
|
438. | Watching Software Run Beyond Defect Elimination 3 4 | 0 | |
|
439. | Kevin Glisson Enterprise wide SSL Automation w Lemur CloudCA | 0 | |
|
440. | Zane Jarvis and Ben Passmore Are we ready for the G20 CrikeyCon 2014 | 0 | |
|
441. | Top 10 Security Best Practices to secure your Microservices | 0 | |
|
442. | The Eleventh HOPE 2016 De Anonymizing Bitcoin One Transaction at a Time | 0 | |
|
443. | OWASP Secure Coding Practices Quick Reference Guide 2 2 | 0 | Guide |
|
444. | Ingeniería Social Aplicada a las Aplicaciones Web | 0 | |
|
445. | Sinking Your Hooks in Applications Richard Meester & Joe Rozner | 0 | |
|
446. | A2C Self Destructing Exploit Executions via Input Perturbation | 0 | Guide |
|
447. | When encryption is not enough Attacking Wearable | 0 | |
|
448. | Building Loosely coupled RISC V Accelerators Using Chisel FIRRTL to build accelerator templates and… | 0 | |
|
449. | Brakeman and Jenkins The Duo Detect Defects in Ruby on Rails Code | 0 | |
|
450. | Lockwood Twin | 0 | |
|
451. | HUNT Data Driven Web Hacking & Manual Testing JP Villanueva | 0 | Tutorial |
|
452. | Panel Simple Router Security, What Every ISP Router Engineer Should Know and Practice | 0 | |
|
453. | Chenxi Wang Protect Containerized Applications With System Call Profiling | 0 | |
|
454. | INSuRE Program Overview | 0 | Guide |
|
455. | Keynote How to recruit spies on the internet | 0 | Guide |
|
456. | Justin Collins Practical Static Analysis for Continuous Application Security | 0 | |
|
457. | Temporal It's Not Your Developers' Fault Edwin Kwan | 0 | |
|
458. | CircleCityCon 2018 Patching Its Complicated Cheryl Biswas | 0 | |
|
459. | The DevOps of Everything | 0 | |
|
460. | Chris Goettl Your Partner for Superior Cybersecurity | 0 | |
|
461. | Improve your SDLC with CAPEC and CWE | 0 | |
|
462. | Tushar Dalvi & Tony Trummer QARK Android App Exploit and SCA Tool | 0 | |
|
463. | Temporal Preventing an OWASP Top 10 in the world of AI Aaron Ansari | 0 | |
|
464. | Securing Redis with Sedona Will Urbanski | 0 | |
|
465. | Keynote Mark Curphey 2020 The History and Future of OWASP | 0 | |
|
466. | Orchestrating Security Tools with AWS Step Functio | 0 | |
|
467. | Keynote Renee Guttmann CISO Perspectives | 0 | |
|
468. | OWASP SEDATED Simeon Cloutier & Dennis Kennedy | 0 | |
|
469. | Topics of Interest Common NGINX Misconfigurations That Leave Your Web Server Open S Pearlman | 0 | |
|
470. | New Compat Vulnerabilities in Linux Device Drivers | 0 | |
|
471. | Temporal Security As Code The New Model Of Achieving Security At Scale Dr Chenxi Wang | 0 | |
|
472. | Minimizing Trust Liabilities in Secure Group Messaging Infrastructures | 0 | Guide |
|
473. | Insecure Expectations Matt Konda | 0 | |
|
474. | Are we using Java Crypto API Securely Mansi Sheth | 0 | |
|
475. | Standard Classification Stop the looters method to detect digital skimming a N Alexiou | 0 | |
|
476. | Geospatial Tempus | 0 | |
|
477. | Flagship Projects OWASP Juice Shop Björn Kimminich | 0 | |
|
478. | From an URGENT 11 Vulnerability to a Full Take Down of a Factory, Using a Single Packet | 0 | |
|
479. | Pushing CSP to PROD Brian Holyfield, Erik Larsson | 0 | |
|
480. | Topics of Interest Common Application Security Mistakes that Enable Automated Attacks Jason Kent | 0 | |
|
481. | Tour of OWASP Projects 2 3 | 0 | |
|
482. | Studio 1 THE PROJECT OF CRYPTOANARCHY Smuggler | 0 | |
|
483. | Security Architecting Applications for the Cloud 3 4 | 0 | |
|
484. | Passive Bluetooth Monitoring | 0 | |
|
485. | Daniel Kefer, Rene Reuter Addressing Security Requirements in Development Projects | 0 | |
|
486. | Temporal Looking at 4 years of web honeypot attacks tactics, Malcolm Heath • Raymond Pompon | 0 | |
|
487. | Panel Discussion Security Trends 4 4 | 0 | Discussion |
|
488. | Android RE and malware analysis 101 Alexander Antukh, Daniel Ramirez Martin | 0 | |
|
489. | Panel Discussion Defining the Identity Management Framework 2 4 | 0 | Discussion |
|
490. | An Information Sharing and Analysis Center for the Internet | 0 | Guide |
|
491. | OWASP DefectDojo Project Timo Pagel & Stefan Fleckenstein | 0 | |
|
492. | Flagship Projects OWASP Security Knowledge Framework Glenn ten Cate | 0 | |
|
493. | OWASP Secure Coding Practices Quick Reference Guide 1 2 | 0 | Guide |
|
494. | GNU Radio meets Scapy | 0 | |
|
495. | The Self Healing Cloud Protecting Applications and Infrastructure | 0 | |
|
496. | Courtney Eckhardt The mechanics of being good to each other | 0 | |
|
497. | Trusted Types A World Without XSS Gabor Pék & Dávid Schütz | 0 | |
|
498. | Solving Real World Problems with an Enterprise Security API ESAPI 1 4 | 0 | |
|
499. | Real Time Application Defenses The Reality of AppSensor and ESAPI 3 3 | 0 | |
|
500. | Nitesh Dhanjani Justin Clark Black Hat - USA - 2004 | 0 | |
|