2023-12-26 | John Pavone Ah mom, why do I need to eat my vegetables | 54:57 | 1 | |
|
2023-12-26 | Kevin Glisson Enterprise wide SSL Automation w Lemur CloudCA | 42:21 | 0 | |
|
2023-12-26 | Keynote Alex Stamos The Moral Imperatives and Challenges for Modern Application Security | 45:40 | 0 | |
|
2023-12-26 | Modern Malvertising and Malware web based exploit campaigns James Pleger | 54:02 | 0 | |
|
2023-12-26 | New Methods in Automated XSS Detection Ken Belva | 41:02 | 1 | |
|
2023-12-26 | Patrick Kelley Going Bananas for Cloud Security AWS deployment with security monkey | 37:19 | 0 | |
|
2023-12-26 | PHP Security, Redefined Chris Cornutt | 42:52 | 0 | |
|
2023-12-26 | Justin Collins Practical Static Analysis for Continuous Application Security | 38:43 | 2 | |
|
2023-12-26 | Your License for Bug Hunting Season | 55:04 | 2 | |
|
2023-12-26 | Kevin Johnson & Jason Gillam Next Gen Web Pen Testing | 57:32 | 0 | |
|
2023-12-26 | Zane Lackey Practical tips for web application security in the age of agile and DevOps | 53:07 | 0 | |
|
2023-12-26 | Arshan Dabirsiaghi How To Find The Next Great Deserialization CVE | 35:12 | 0 | Guide |
|
2023-12-26 | Automating API Penetration Testing using fuzzapi | 45:35 | 0 | |
|
2023-12-26 | Manideep Konakandla Breaking and Fixing your ‘Docker’ ized environments | 57:13 | 2 | |
|
2023-12-26 | Chenxi Wang Protect Containerized Applications With System Call Profiling | 53:14 | 0 | |
|
2023-12-26 | Marco Lancini Needle Finding Issues within iOS Applications | 21:28 | 0 | |
|
2023-12-26 | Chris Gates & Ken Johnson DevOops Redux | 52:28 | 1 | |
|
2023-12-26 | Matt Tesauro AppSec Take the best of Agile, DevOps and CI CD into your AppSec Program | 47:50 | 1 | |
|
2023-12-26 | Ofer Maor Putting an 'I' in Code Review Turning Code Reviewing Interactive | 43:26 | 0 | Review |
|
2023-12-26 | Cleaning Your Applications' Dirty Laundry with Scumblr | 53:07 | 0 | |
|
2023-12-26 | Patterns of Authentication and Self Announcement in IoT | 47:23 | 0 | |
|
2023-12-26 | Dan Kuykendall SPArring with the Security of Single Page Applications | 55:55 | 0 | |
|
2023-12-26 | Practical Tips For Running A Successful Bug Bounty Program | 51:49 | 1 | |
|
2023-12-26 | Dave Lewis Barbarians at the Gateway | 44:54 | 0 | |
|
2023-12-26 | Eric Johnson Continuous Integration Live Static Analysis using Visual Studio & the Roslyn API | 54:06 | 0 | |
|
2023-12-26 | Scaling Security Assessment at the Speed of DevOps | 49:51 | 1 | |
|
2023-12-26 | Should there be an Underwriters Laboratories certification for software in IoT products | 54:57 | 0 | |
|
2023-12-26 | Evan Johnson Misconfigured CORS and why web appsec is not getting easier | 39:46 | 0 | |
|
2023-12-26 | Everything is Terrible Three Perspectives on Building, Configuring, and Securing Software | 49:09 | 0 | |
|
2023-12-26 | Simon Thorpe Why using SMS in the authentication chain is risky | 1:02:12 | 0 | |
|
2023-12-26 | HTTPS & TLS in 2016 Security practices from the front lines | 1:01:12 | 0 | |
|
2023-12-26 | Stephen De Vries Threat Modeling With Architectural Risk Patterns | 49:50 | 0 | |
|
2023-12-26 | Using language theoretics and runtime visibility to align AppSec with DevOps | 50:06 | 0 | |
|
2023-12-26 | James Kettle Exploiting CORS Misconfigurations for Bitcoins and Bounties | 45:36 | 0 | |
|
2023-12-26 | Jimmy Mesta Containerizing your Security Operations Center | 46:59 | 0 | |
|
2023-12-26 | When encryption is not enough Attacking Wearable | 43:28 | 1 | |
|
2023-12-26 | Yair Amit The Ways Hackers Are Taking To Win The Mobile Malware Battle | 42:06 | 0 | |
|
2023-12-26 | Top 10 Security Best Practices to secure your Microservices | 38:11 | 1 | |
|
2023-12-26 | There’s a new sheriff in town dynamic security group recommendations with Grouper and Dredge | 31:04 | 0 | |
|
2023-12-26 | WAFs FTW A modern devops approach to security testing your WAF | 32:42 | 0 | |
|
2023-12-26 | This Old App, a guide to renovating apps for the cloud | 29:49 | 0 | Guide |
|
2023-12-26 | What We Learned Remediating XSS in GitHub Open Source Projects | 49:02 | 0 | |
|
2023-12-26 | Making Vulnerability Management Less Painful with OWASP DefectDojo | 39:44 | 1 | |
|
2023-12-26 | Measuring End to End Security Engineering | 33:47 | 1 | |
|
2023-12-26 | When Molehill Vulnerabilities Become Mountainous Exploits | 38:38 | 0 | |
|
2023-12-26 | Monitoring Application Attack Surface and Integrating Security into DevOps | 47:44 | 0 | |
|
2023-12-26 | Where we’re going we won’t need passwords | 29:47 | 0 | |
|
2023-12-26 | Moving Fast and Securing Things | 41:56 | 0 | |
|
2023-12-26 | NoSQL Is Not NoVulnerable Johannes Ullrich | 34:45 | 0 | |
|
2023-12-26 | Passive Fingerprinting of HTTP 2 Clients Elad Shuster | 38:00 | 1 | |
|
2023-12-26 | Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong | 46:05 | 0 | |
|
2023-12-26 | Practical Dynamic Application Security Testing within an Enterprise | 32:48 | 0 | |
|
2023-12-26 | ReproNow Save time Reproducing and Triaging Security bugs | 43:41 | 0 | |
|
2023-12-26 | Secure Product Lifecycle SPLC as a Service | 33:35 | 0 | |
|
2023-12-26 | Securing C code that seems to work just fine | 28:54 | 2 | |
|
2023-12-26 | Supply Chain Anarchy Trojaned Binaries in the Java Ecosystem | 36:36 | 2 | |
|
2023-12-26 | Test Driven Security in the DevOps pipeline | 41:53 | 0 | |
|
2023-12-25 | Blended Threats and JavaScript A Plan for Permanent Network Compromise | 34:28 | 1 | |
|
2023-12-25 | Bug Bounty Programs | 44:07 | 13 | |
|
2023-12-25 | Builders vs Breakers | 40:22 | 1 | |
|
2023-12-25 | Building a Web Attacker Dashboard with ModSecurity and BeEF | 43:39 | 4 | |
|
2023-12-25 | Building Predictable Systems Using Behavioral Security Modeling | 32:58 | 3 | |
|
2023-12-25 | Counterintelligence Attack Theory | 48:36 | 3 | |
|
2023-12-25 | Cracking the Code of Mobile Application | 49:00 | 4 | |
|
2023-12-25 | Cross Site Port Scanning | 34:19 | 1 | |
|
2023-12-25 | Demystifying Security in the Cloud AWS Scout | 39:24 | 0 | |
|
2023-12-25 | DevOps Distilled The Devops Panel | 38:04 | 0 | |
|
2023-12-25 | Doing the Unstuck How Rugged Cultures Drive Biz & AppSec Value | 44:01 | 0 | |
|
2023-12-25 | Effective Approaches to Web Application Security | 40:51 | 0 | |
|
2023-12-25 | Four Axes of Evil | 40:43 | 4 | |
|
2023-12-25 | Analyzing and Fixing Password Protection Schemes | 54:40 | 0 | |
|
2023-12-25 | AppSec Training, Securing the SDLC, WebGoat NET and the Meaning of Life | 36:14 | 5 | |
|
2023-12-25 | Audio only Panel don't Tell Me Software Security moderated by Mark Miller | 41:32 | 1 | |
|
2023-12-25 | Audio only PANEL Women in Information Security moderated by Joan Goodchild | 48:45 | 1 | Guide |
|
2023-12-25 | OWASP Hackademic Konstantinos Papapanagiotou | 36:34 | 0 | |
|
2023-12-25 | Why is SCADA Security an Uphill Battle Amol Sarwate | 46:41 | 0 | |
|
2023-12-25 | OWASP Periodic Table of Elements James Landis | 49:20 | 2 | |
|
2023-12-25 | Audio only Wassup MOM Owning the Message Oriented Middleware Gursev Singh Kalra | 50:31 | 1 | |
|
2023-12-25 | OWASP Zed Attack Proxy Simon Bennetts | 51:17 | 0 | |
|
2023-12-25 | Forensic Investigations of Web Exploitations Ondrej Krehel | 53:13 | 0 | |
|
2023-12-25 | 2013 AppSec Guide and CISO Survey Marco Morana, Tobias Gondrom | 41:22 | 0 | Guide |
|
2023-12-25 | PiOSoned POS A Case Study in iOS based Mobile Point of Sale gone wrong Mike Park | 39:47 | 0 | |
|
2023-12-25 | Accidental Abyss Data Leakage on The Internet Kelly FitzGerald | 38:30 | 1 | |
|
2023-12-25 | Pushing CSP to PROD Brian Holyfield, Erik Larsson | 50:30 | 1 | |
|
2023-12-25 | Hack me a new way to learn web application security Armando Romeo | 44:26 | 1 | |
|
2023-12-25 | All the network is a stage, and the APKs merely players Daniel Peck | 41:53 | 2 | |
|
2023-12-25 | Hacking Web Server Apps for iOS Bruno Oliveira | 30:46 | 1 | |
|
2023-12-25 | Revenge of the Geeks Hacking Fantasy Sports Sites Dan Kuykendall | 45:49 | 1 | |
|
2023-12-25 | HTML5 Risky Business or Hidden Security Tool Chest Johannes Ullrich | 50:37 | 0 | |
|
2023-12-25 | An Introduction to the Newest Addition to the OWASP Top 10 Ryan Berg, Jeff Williams | 48:20 | 2 | |
|
2023-12-25 | Tagging Your Code with a Useful Assurance Label Robert Martin | 30:31 | 0 | |
|
2023-12-25 | Application Security Everything we know is wrong Eoin Keary | 43:41 | 1 | |
|
2023-12-25 | HTTP Time Bandit Vaagn Toukharian, Tigran Gevorgyan | 43:17 | 0 | |
|
2023-12-25 | The 2013 OWASP Top 10 Dave Wichers | 49:17 | 0 | |
|
2023-12-25 | AppSec at DevOps Speed and Portfolio Scale Jeff Williams | 51:53 | 0 | |
|
2023-12-25 | Insecure Expectations Matt Konda | 46:22 | 1 | |
|
2023-12-25 | The Cavalry Is US Protecting the public good Josh Corman, Nicholas Percoco | 49:40 | 1 | |
|
2023-12-25 | iOS Application Defense iMAS Gregg Ganley | 43:21 | 3 | |
|
2023-12-25 | BASHing iOS Applications Jason Haddix, Dawn Isabel | 46:33 | 3 | |
|
2023-12-25 | The Perilous Future of Browser Security Robert Hansen | 41:53 | 4 | |
|