2023-12-27 | Enhancing Physical Perimeter Defense Using SDR | 23:41 | 0 | |
|
2023-12-27 | Federated Login CSRF | 29:43 | 0 | Vlog |
|
2023-12-27 | Black Box Approximate Tain't Tracking by Utilizing Data Partitioning | 36:18 | 2 | |
|
2023-12-27 | Friday the 13th Attacking JSON Alvaro Muñoz & Oleksandr Mirosh | 40:43 | 0 | |
|
2023-12-27 | Bug Bounty Programs Successfully Controlling Complexity and Perpetual Temptation | 50:24 | 0 | |
|
2023-12-27 | Handling of Security Requirements in Software Development Lifecycle | 39:24 | 1 | |
|
2023-12-27 | Building a Secure DevOps Pipeline | 42:35 | 0 | |
|
2023-12-27 | How To Approach InfoSec Like a Federal Auditor | 36:55 | 0 | Guide |
|
2023-12-27 | How to detect CSRF vulnerability, reliably | 42:00 | 0 | Guide |
|
2023-12-27 | Building Secure ASP NET Core MVC Applications | 31:46 | 1 | |
|
2023-12-27 | How to stop worring about application Container security | 38:00 | 0 | Guide |
|
2023-12-27 | Capture the Flag for Developers | 46:26 | 4 | |
|
2023-12-27 | HUNT Data Driven Web Hacking & Manual Testing JP Villanueva | 43:35 | 0 | Tutorial |
|
2023-12-27 | Cookie Security Myths and Misconceptions David Johansson | 48:57 | 0 | |
|
2023-12-27 | iGoat A Self Learning Tool for iOS App Pentesting and Security | 25:43 | 0 | |
|
2023-12-27 | Core Rule Set for the Masses | 36:40 | 0 | |
|
2023-12-27 | Crafting the next generation Man in the Browser Trojan | 54:23 | 0 | |
|
2023-12-27 | Juggling the Elephants Making AppSec a Continuous Program | 46:04 | 1 | |
|
2023-12-27 | Keynote Runa Sandvik Building a Culture of Security at The New York Times | 43:34 | 0 | |
|
2023-12-27 | Differences Between Web Application Scanning Tools when Scanning for XSS and SQLi | 39:49 | 4 | |
|
2023-12-27 | A Static Tainting Analysis Method for Aspect Oriented Programs | 36:35 | 0 | |
|
2023-12-27 | Keynote Tony UcedaVelez Fixing Threat Models with OWASP Efforts | 43:16 | 0 | |
|
2023-12-27 | An Agile Framework for Building GDPR Requirements into SDLC | 34:53 | 1 | |
|
2023-12-27 | Leveraging Blockchain for Identity and Authentication in IoT is good for Security | 37:13 | 1 | |
|
2023-12-27 | An Overview of API Underprotection | 36:49 | 0 | |
|
2023-12-27 | Ecosystem, Interoperability and Standards IoT Security | 30:34 | 0 | |
|
2023-12-27 | Empowering the Employee Incident Response with a Security Bot Jeremy Krach | 22:28 | 1 | |
|
2023-12-27 | OWASP IoT Top 10 Daniel Miessler | 21:12 | 0 | |
|
2023-12-27 | The Anatomy of a Secure Web Application in Java Using Spring Security and Apache Fortress | 35:21 | 0 | |
|
2023-12-27 | inSecurity is eating the world Michael Coates | 43:59 | 0 | |
|
2023-12-27 | ZAP Heads Up Display David Scrobonia | 28:51 | 0 | |
|
2023-12-27 | OWASP Leaders Workshop Part 1 | 55:23 | 0 | |
|
2023-12-27 | Value Driven Threat Modeling Avi Douglen | 34:57 | 1 | |
|
2023-12-27 | A new framework to automate MSTG and MASVS in your CI CD pipeline | 26:11 | 0 | |
|
2023-12-27 | Threat Model as Code Abhay Bhargav | 33:36 | 0 | |
|
2023-12-27 | Web application compromise mitigation with crypto anchoring Jon Debonis | 25:43 | 0 | |
|
2023-12-27 | AppSecUSA 2018 Welcome Address by Karen Staley and Travis McPeak | 6:32 | 0 | |
|
2023-12-27 | Are we using Java Crypto API Securely Mansi Sheth | 29:51 | 1 | |
|
2023-12-27 | OWASP Leaders Workshop Part 2 | 1:53:46 | 2 | |
|
2023-12-27 | Exposing Security Flaws in Trading Technologies Alejandro Hernandez | 38:02 | 0 | Vlog |
|
2023-12-27 | Authentication as a Microservice Portable Customer Identity Management Brian Pontarelli | 37:46 | 1 | |
|
2023-12-27 | Fixing Mobile AppSec Sven Schleier | 29:05 | 1 | |
|
2023-12-27 | Flying Above the Clouds Securing Kubernetes Jack Mannino | 52:43 | 0 | |
|
2023-12-27 | Battle Tested Application Security Ty Sbano | 33:22 | 0 | |
|
2023-12-27 | OWASP SEDATED Simeon Cloutier & Dennis Kennedy | 26:31 | 0 | |
|
2023-12-27 | How to get the best AppSec test of your life Josh Grossman | 32:11 | 0 | Guide |
|
2023-12-27 | Breaking fraud & bot detection solutions Mayank Dhiman | 34:54 | 1 | |
|
2023-12-27 | Pentesting Swift Application with OWASP iGoat Swaroop Yermalkar | 15:10 | 2 | |
|
2023-12-27 | Prevent Business Logic Attacks using Dynamic Instrumentation Jean Baptiste Aviat | 26:18 | 0 | Vlog |
|
2023-12-27 | Chromebooks and network motes to enforce security posture from the device to the cloud Jon Debonis | 30:44 | 0 | |
|
2023-12-27 | Human factors that influence secure software development | 43:03 | 0 | |
|
2023-12-27 | SCORE Bot Shift Left, at Scale Vidhu Jayabalan Laksh Raghavan | 30:14 | 0 | |
|
2023-12-27 | Defensible Application Security for the Artificial Intelligence Era Chenxi Wang | 38:36 | 1 | |
|
2023-12-27 | Identity Theft Attacks on SSO Systems Kelby Ludwig | 31:26 | 1 | |
|
2023-12-27 | Scratching the Surface of your CD Ofer Maor | 36:24 | 0 | |
|
2023-12-27 | Lessons from integrating third party library scanning in DevOps workflow | 21:03 | 0 | |
|
2023-12-27 | Dependency Track Steve Springett | 34:21 | 0 | |
|
2023-12-27 | Making Security Approachable for Developers and Operators Armon Dadgar | 42:24 | 1 | |
|
2023-12-27 | SDL at Scale Growing Security Champions Ryan O'Boyle | 35:07 | 0 | |
|
2023-12-27 | Deserialization Vulnerability Remediation with Automated Gadget Chain Discovery Ian Haken | 32:19 | 0 | |
|
2023-12-27 | My journey through building an advanced bot detection product David Senecal | 32:54 | 0 | |
|
2023-12-27 | Deserialization what, how and why not Alexei Kojenov | 34:27 | 0 | |
|
2023-12-27 | Security as a Service Work where You Engineers Live | 27:50 | 0 | |
|
2023-12-27 | Security Culture Hacking Disrupting the Security Status Quo Chris Romeo | 37:16 | 0 | |
|
2023-12-27 | Open Source Security Tools for Kubernetes Applications Michael Ducy | 37:30 | 0 | |
|
2023-12-27 | Domino's Delivery of a Faster Response was No Standard Order Michael Sheppard | 35:53 | 0 | |
|
2023-12-27 | Security Vulnerabilities in AI Assistant Based Applications Abraham Kang | 47:35 | 1 | |
|
2023-12-27 | OWASP Amass Project Jeff Foley | 44:59 | 0 | |
|
2023-12-27 | OWASP Code Pulse and Attack Surface Detector Ken Prole | 33:35 | 1 | |
|
2023-12-27 | Serverless Infections Malware Just Found a New Home Erez Yalon | 33:55 | 1 | |
|
2023-12-27 | OWASP Glue Tool Matt Konda | 39:00 | 2 | |
|
2023-12-27 | Single Page Applications Is your design secure | 29:37 | 3 | |
|
2023-12-27 | Teach a man how to fish Jeroen Willemsen | 29:34 | 3 | Guide |
|
2023-12-26 | Stop Chasing Vulnerabilities Introducing Continuous Application Security | 48:58 | 1 | |
|
2023-12-26 | SWAMP & Partners Panel Discussion AppSec USA 2014 18 Sept 2014 | 41:58 | 6 | Discussion |
|
2023-12-26 | Ten Secrets to Secure Mobile Applications | 44:54 | 3 | |
|
2023-12-26 | The DevOps of Everything | 43:23 | 2 | |
|
2023-12-26 | Threat Modeling Made Interactive | 40:23 | 0 | |
|
2023-12-26 | Top 10 Web Hacking Techniques of 2013 | 46:35 | 7 | |
|
2023-12-26 | Use After Free Exploitation | 47:12 | 3 | |
|
2023-12-26 | Warning Ahead Security Storms are Brewing in Your JavaScript | 33:48 | 1 | |
|
2023-12-26 | When you can t afford 0days Client side exploitation for the masses | 43:40 | 1 | |
|
2023-12-26 | Where the Security Rubber Meets the DevOps Road | 46:54 | 0 | |
|
2023-12-26 | Your Password Complexity Requirements are Worthless | 46:39 | 2 | |
|
2023-12-26 | Runtime Manipulation of Android and iOS Applications | 42:38 | 2 | |
|
2023-12-26 | Static Analysis for Dynamic Assessments | 38:02 | 1 | |
|
2023-12-26 | Rob Witoff Future Banks Live in The Cloud Building a Usable Cloud with Uncompromising Security | 53:07 | 2 | |
|
2023-12-26 | Wait, Wait don't pwn Me | 37:45 | 1 | |
|
2023-12-26 | Secure Authentication without the Need for Passwords Don Malloy | 27:12 | 1 | |
|
2023-12-26 | Rohit Pitke Continuous Cloud Security Automation | 34:36 | 3 | |
|
2023-12-26 | A New Ontology of Unwanted Web Automation Colin Watson | 44:23 | 1 | Vlog |
|
2023-12-26 | SecureMe Droid Android Security Application Vishal Asthana & Abhineet Jayaraj | 47:20 | 0 | |
|
2023-12-26 | Sinking Your Hooks in Applications Richard Meester & Joe Rozner | 43:31 | 0 | |
|
2023-12-26 | AppSensor Real Time Event Detection and Response John Melton | 48:42 | 0 | |
|
2023-12-26 | Building your own large scale web security scanning infrastructure in 40 minutes | 38:51 | 2 | |
|
2023-12-26 | Tim Bach Chimera Securing a Cloud App Ecosystem with ZAP at Scale | 44:46 | 0 | |
|
2023-12-26 | Daniel Somerfield Turtles All the Way Down Storing Secrets in the Cloud and the Data Center | 47:31 | 0 | |
|
2023-12-26 | Tushar Dalvi & Tony Trummer QARK Android App Exploit and SCA Tool | 49:57 | 0 | |
|
2023-12-26 | Detecting and managing bot activity more efficiently David Senecal | 53:53 | 1 | |
|
2023-12-26 | Game of Hacks The Mother of All Honeypots Igor Matlin | 42:41 | 0 | |
|