2024-01-02 | OWASP PHP Security Project by Rahul Chaudhary | 1:29:10 | 1 | |
|
2024-01-02 | OWASP RBAC Project by Abbas Naderi | 12:20 | 0 | |
|
2024-01-02 | Project Summit Mobile Security Session by Jason Haddix | 17:24 | 0 | |
|
2024-01-02 | Projects Summit 2013 Quick Sky Lounge | 0:12 | 1 | |
|
2024-01-02 | ESAPI Crypto Changes by Kevin Wall | 8:40 | 0 | |
|
2024-01-02 | Key Casting Final Cast keys Opening Abloy | 0:45 | 0 | |
|
2024-01-02 | Key Casting Pt 1 Heating up metal for casting | 1:06 | 2 | |
|
2024-01-02 | Abloy Protec Cutaway | 0:19 | 0 | |
|
2024-01-02 | Bilock Exclusive 1 | 0:11 | 0 | |
|
2024-01-02 | Bilock Exclusive 2 | 0:12 | 0 | |
|
2024-01-02 | Bilock Pins | 0:11 | 0 | |
|
2024-01-02 | Bilock sidebar | 0:14 | 1 | |
|
2024-01-02 | Bluetooth that bites BTLE Unlocking Huajiang ‘Kevin2600’ Chen | 46:33 | 0 | |
|
2024-01-02 | Key Casting Pt 2 Heating | 0:21 | 0 | |
|
2024-01-02 | Key Casting Pt 3 Vacuum | 0:06 | 0 | |
|
2024-01-02 | Key Impressioning Jos Weyers | 53:03 | 0 | |
|
2024-01-02 | Chinese contemporary mechanical locks Lucas Zhao | 56:37 | 1 | |
|
2024-01-02 | Lockwood Twin | 0:17 | 0 | |
|
2024-01-02 | Contactless Access Control 2 Life, uh, finds a way Ryan And Jeremy 1 | 7:14 | 1 | |
|
2024-01-02 | Panel | 56:20 | 1 | |
|
2024-01-02 | Contactless Access Control 2 Life, uh, finds a way Ryan And Jeremy 2 | 19:08 | 1 | |
|
2024-01-02 | Contactless Access Control 2 Life, uh, finds a way Ryan And Jeremy 3 | 7:02 | 0 | |
|
2024-01-02 | Cutting handcuffs OzLockCon 2017 | 1:23 | 7 | |
|
2024-01-02 | Galaxy lock | 0:13 | 2 | |
|
2024-01-02 | History of lock picking Grace Nolan | 23:58 | 1 | |
|
2024-01-02 | Safes banks, burglars, budgets and the average Joe Michael Maynard | 1:00:50 | 0 | |
|
2024-01-02 | Security In Depth When Security Theatre Just Isn't Enough Craig Rumball | 35:51 | 0 | |
|
2024-01-02 | ¿Qué es OWASP, Open Web Application Security Project | 52:03 | 0 | |
|
2024-01-02 | Buscando en el Internet de las Cosas IoT | 50:04 | 0 | |
|
2024-01-02 | Hackeando APIs REST | 41:20 | 1 | |
|
2024-01-02 | Ingeniería Social Aplicada a las Aplicaciones Web | 50:52 | 0 | |
|
2024-01-02 | Nsearch, lo que le faltaba a NMap | 38:40 | 0 | |
|
2024-01-02 | Seguridad en Smart Grid | 36:57 | 1 | |
|
2024-01-02 | Testimonios sobre el OWASP Latam Tour Capítulo Manizales 2017 Efrain | 2:00 | 0 | |
|
2024-01-02 | Testimonios sobre el OWASP Latam Tour Capítulo Manizales 2017 Santiago | 1:34 | 0 | |
|
2024-01-02 | Vulnerabilities in Secure Code 4 4 | 4:21 | 1 | |
|
2024-01-02 | Watching Software Run Beyond Defect Elimination 1 4 | 9:30 | 1 | |
|
2024-01-02 | Watching Software Run Beyond Defect Elimination 2 4 | 9:30 | 0 | |
|
2024-01-02 | Watching Software Run Beyond Defect Elimination 3 4 | 9:30 | 1 | |
|
2024-01-02 | Beware of Serialized GUI Objects Bearing Data 5 5 | 0:17 | 0 | |
|
2024-01-02 | Cloud Security Alliance State of the Union 1 2 | 9:30 | 0 | |
|
2024-01-02 | Watching Software Run Beyond Defect Elimination 4 4 | 2:56 | 0 | |
|
2024-01-02 | Vulnerabilities in Secure Code 3 4 | 10:00 | 1 | |
|
2024-01-02 | Cloud Security Alliance State of the Union 2 2 | 5:12 | 0 | |
|
2024-01-02 | OWASP State of the Union 1 2 | 9:30 | 0 | |
|
2024-01-02 | OWASP State of the Union 2 2 | 6:51 | 0 | |
|
2024-01-02 | Solving Real World Problems with an Enterprise Security API 1 4 | 10:00 | 1 | |
|
2024-01-02 | Solving Real World Problems with an Enterprise Security API 2 4 | 10:00 | 0 | |
|
2024-01-02 | Solving Real World Problems with an Enterprise Security API 3 4 | 10:00 | 0 | |
|
2024-01-02 | Solving Real World Problems with an Enterprise Security API 4 4 | 6:26 | 0 | |
|
2024-01-02 | Vulnerabilities in Secure Code 1 4 | 10:00 | 0 | |
|
2024-01-02 | Vulnerabilities in Secure Code 2 4 | 10:00 | 0 | |
|
2024-01-02 | Beware of Serialized GUI Objects Bearing Data 1 5 | 10:00 | 0 | |
|
2024-01-02 | Beware of Serialized GUI Objects Bearing Data 2 5 | 10:00 | 0 | |
|
2024-01-02 | Beware of Serialized GUI Objects Bearing Data 3 5 | 10:00 | 0 | |
|
2024-01-02 | Beware of Serialized GUI Objects Bearing Data 4 5 | 10:00 | 0 | |
|
2024-01-02 | Using the O2 platform | 48:51 | 0 | |
|
2024-01-02 | 2013 Board election and WASPY | 18:50 | 0 | |
|
2024-01-02 | Initiatives OWASP Projects | 50:42 | 0 | |
|
2024-01-02 | Jack Mannino GoatDroid release | 50:44 | 0 | |
|
2024-01-02 | Josh Sokol Simple Risk | 46:26 | 0 | |
|
2024-01-02 | Ken Johnson RailsGoat | 32:46 | 0 | |
|
2024-01-02 | Marketing Strategy | 20:54 | 0 | |
|
2024-01-02 | OWASP HIVE Project Welcome to the Grid | 50:11 | 0 | |
|
2024-01-02 | OWASP Media Project | 41:34 | 1 | |
|
2024-01-01 | Why checking your infrastructure as code for misconfigurations is not enough How Aakash Shah | 48:13 | 2 | |
|
2024-01-01 | Purple Teaming with OWASP PurpleTeam Kim Carter | 29:50 | 0 | |
|
2024-01-01 | Roadblocks for CSP and Where to Find Them Sebastian Roth | 39:20 | 1 | |
|
2024-01-01 | SBOM SmackDown Conquer dragons in the shadows with OWASP CycloneDX Steve Springett | 50:22 | 1 | |
|
2024-01-01 | Changed Responsibilities in Modern Development Practices Martin Knobloch | 26:19 | 1 | |
|
2024-01-01 | Cluster Wrangling How to make Kubernetes clusters secure and usable Rory McCune | 48:34 | 2 | Guide |
|
2024-01-01 | Who’s in control Human or Machine David Senecal & Luke Stork | 47:53 | 0 | |
|
2024-01-01 | Container Security It’s All About the Supply Chain Michele Chubirka | 47:35 | 0 | |
|
2024-01-01 | Data at Rest Encryption Going Beyond the Basics to Address Modern Attacks Chuck Willis & Wias Issa | 46:53 | 2 | |
|
2024-01-01 | How to build a security mindset Anna Lezhikova | 47:35 | 0 | Guide |
|
2024-01-01 | How to Thwart Malicious Automation and Kick Bot Butt for $0 Randy Gingeleski | 48:06 | 0 | Guide |
|
2024-01-01 | How to Use Your Vulnerabilities to Train Your Developers on Security Jared Ablon | 20:17 | 0 | Guide |
|
2024-01-01 | Insiders Guide to Mobile AppSec with Latest OWASP MASVS Brendan Hann | 29:14 | 0 | Guide |
|
2024-01-01 | Keynote 25 Years in AppSec Looking Back, Looking Forward Adam Shostack | 44:09 | 1 | |
|
2024-01-01 | Practical Threat Modeling for real world and Cloud Situations in our hybrid and W Uma Rajagopal | 52:59 | 6 | |
|
2024-01-01 | Keynote Data is a new security boundary Anastasiia Voitova | 51:15 | 0 | |
|
2024-01-01 | Keynote Request Forgery on the Web SSRF, CSRF and Clickjacking Jim Manico | 46:52 | 0 | |
|
2024-01-01 | OWASP Open Application Security Curriculum Adrian Winckles | 29:03 | 0 | |
|
2024-01-01 | OWASP ZAP & DeepFactor Continuous AppSec Observability Made For Each Other Kiran Kamity | 37:37 | 0 | |
|
2024-01-01 | Hacking And Defending APIs Red And Blue Make Purple Matt Tesauro | 53:06 | 1 | |
|
2024-01-01 | Passwordless Future Using WebAuthn And Passkeys In Practice Clemens Hübner | 59:01 | 1 | |
|
2024-01-01 | What We've Learned From Scanning 10K Kubernetes Clusters Ben Hirschberg | 51:23 | 1 | |
|
2024-01-01 | How To Have Visibility And Security OF A CICD Pipeline Pramod Rana | 42:17 | 1 | Guide |
|
2024-01-01 | Philosophizing Security In A Mobile First World Sergiy Yakymchuk | 51:43 | 1 | |
|
2024-01-01 | Why Winning In Cybersecurity Means Winning More Everyday Jessica Robinson | 58:22 | 0 | |
|
2024-01-01 | TOTPs Are Not As Secure As You Might Believe Santiago Kantorowicz | 44:58 | 0 | |
|
2024-01-01 | Inc Your sw Assurance w OWASP SAMM V2 1 Seba Deleersnyder & Bart De Win | 54:44 | 0 | |
|
2024-01-01 | A Taste Of Privacy Threat Modeling by Kim Wuyts | 51:02 | 0 | |
|
2024-01-01 | Preventing Subdomain Takeover w OWASP Domain Protect Paul Schwarzenberger | 52:37 | 2 | |
|
2024-01-01 | Introducing Threat Modelling To Established Teams Sarah Jane Madden | 56:42 | 0 | |
|
2024-01-01 | A Weakness In Chrome & A New Hacking Technique Gil Cohen & Omri Inbar | 48:13 | 1 | |
|
2024-01-01 | Reduce Your Perms Mgmt Time While Protecting Your Users Marine Du Mesnil | 29:07 | 1 | |
|
2024-01-01 | JavaScript Realms The Blank Spot In Web App Runtime Security Gal Weizman | 35:14 | 2 | |
|
2024-01-01 | Removing Secrets To Make Your Mobile Apps More MASVS Secure Skip Hovsmith | 48:01 | 0 | |
|
2024-01-01 | AI Assisted Coding The Future Between Challenges And Benefits Magda Chelly | 51:01 | 0 | |
|