2023-12-25 | Big Data Intelligence Ory Segal, Tsvika Klein | 45:54 | 0 | |
|
2023-12-25 | Leveraging OWASP in Open Source Projects Aaron Weaver, David Ohsie, Bill Thompson | 45:23 | 0 | |
|
2023-12-25 | Thinking Differently About Security Mary Ann Davidson | 50:43 | 0 | |
|
2023-12-25 | Can AppSec Training Really Make a Smarter Developer John Dickson | 45:29 | 0 | |
|
2023-12-25 | Making the Future Secure with Java Milton Smith | 49:58 | 0 | |
|
2023-12-25 | Top Ten Proactive Controls Jim Manico | 49:55 | 0 | |
|
2023-12-25 | Case Study 10 Steps to Agile Development without Compromising Enterprise Security Yair Rovek | 50:24 | 1 | |
|
2023-12-25 | Mantra OS Because The World is Cruel Gregory Disney Leugers | 23:10 | 1 | |
|
2023-12-25 | Verify your software for security bugs Simon Roses Femerling | 50:23 | 1 | |
|
2023-12-25 | Mobile app analysis with Santoku Linux Andrew Hoog | 48:33 | 2 | |
|
2023-12-25 | Contain Yourself Building Secure Containers for Mobile Devices Ron Gutierrez | 48:46 | 1 | |
|
2023-12-25 | What You Didn t Know About XML External Entities Attacks Timothy Morgan | 38:39 | 1 | |
|
2023-12-25 | NIST Missions and impacts to US industry, economy and citizens James St Pierre, Matthew Scholl | 40:10 | 0 | |
|
2023-12-25 | Audio only PANEL Aim Ready Fire moderated by Wendy Nather | 41:27 | 0 | |
|
2023-12-25 | OWASP Broken Web Applications OWASP BWA Beyond 1 0 Chuck Willis | 48:48 | 0 | |
|
2023-12-25 | Hacking NETC Applications The Black Arts ASM attacks | 55:53 | 1 | |
|
2023-12-25 | Red Phish, Blue Phish Improved Phishing Detection Using Perceptual Hashing | 40:45 | 0 | |
|
2023-12-25 | Reversing Engineering a Web Application For Fun, Behavior & WAF Detection | 46:38 | 1 | |
|
2023-12-25 | Hacking the Oracle Application Framework | 34:13 | 0 | |
|
2023-12-25 | Headless Browser Hide and Seek | 44:24 | 0 | |
|
2023-12-25 | 11,000 Voices Experts Shed Light on 4 Year Open Source & AppSec Survey | 46:53 | 0 | |
|
2023-12-25 | Anatomy of memory scraping credit card stealing POS malware | 55:55 | 0 | |
|
2023-12-25 | IEEE Computer Societys Center for Secure Design | 44:41 | 0 | |
|
2023-12-25 | iOS App Integrity Got Any | 40:54 | 0 | |
|
2023-12-25 | AppSec Survey 2 0 FineTuning an AppSec Training Program Based on Data cut | 38:34 | 0 | |
|
2023-12-25 | AutoScaling Web Application Security in the Cloud | 40:50 | 2 | |
|
2023-12-25 | Keynote Bruce Schneier The Future of Incident Response | 58:11 | 0 | |
|
2023-12-25 | Blended Web and Database Attacks on Real time, In Memory Platforms | 48:31 | 0 | |
|
2023-12-25 | Bringing a Machete to the Amazon | 40:24 | 1 | |
|
2023-12-25 | Keynote Gary McGraw BSIMM A Decade of Software Security | 1:20:17 | 0 | |
|
2023-12-25 | Building Your Application Security Data Hub The Imperative for Structured Vulnerability Informatio | 49:40 | 0 | |
|
2023-12-25 | Catch me if you can Building a Web Malware Analyzer using Machine Learning | 47:38 | 0 | |
|
2023-12-25 | Clientside security with the Security Header Injection Module SHIM | 38:39 | 1 | |
|
2023-12-25 | Keynote OWASP Global Board | 53:24 | 0 | |
|
2023-12-25 | Cloud Security at Scale and What it Means for Your Application | 46:58 | 1 | |
|
2023-12-25 | DevOps and Security The Facts, The Myths, The Legend | 33:49 | 0 | |
|
2023-12-25 | From the Ground Up | 26:18 | 0 | |
|
2023-12-25 | Ground Truths of a Rugged DevOps Practitioner | 53:18 | 0 | |
|
2023-12-25 | Keynote Renee Guttmann CISO Perspectives | 49:03 | 0 | |
|
2023-12-25 | Lean Security for Small or Medium Sized Business | 39:36 | 0 | |
|
2023-12-25 | Mobile Security Attacks A Glimpse from the Trenches | 48:20 | 0 | |
|
2023-12-25 | Modern Web Application Defense with OWASP Tools | 39:33 | 0 | |
|
2023-12-25 | Not Go Quietly Adaptive Strategies and Unlikely Teammates | 50:47 | 0 | |
|
2023-12-25 | OWASP A9 A Year Later Are you still using components with known vulnerabilities | 45:23 | 0 | |
|
2023-12-25 | Project Monterey or How I Learned to Stop Worrying and Love the Cloud | 48:49 | 1 | |
|
2023-12-24 | The Self Healing Cloud Protecting Applications and Infrastructure | 38:29 | 4 | |
|
2023-12-24 | ESAPI 2 0 Defense Against the Dark Arts | 44:15 | 9 | |
|
2023-12-24 | Mobile Applications Software Assurance 2 2 | 50:41 | 8 | |
|
2023-12-24 | Threat Modeling in the Cloud What You don't Know Will Hurt You | 44:49 | 9 | |
|
2023-12-24 | essons Learned Building Secure ASP NET Applications | 42:58 | 1 | |
|
2023-12-24 | Next Generation Web Attacks HTML 5, DOML3 and XHRL2 | 49:58 | 3 | |
|
2023-12-24 | Ghosts of XSS Past, Present and Future | 48:24 | 2 | |
|
2023-12-24 | obile Web Services | 45:28 | 1 | |
|
2023-12-24 | ow NOT to Implement Cryptography for the OWASP Top 10 Reloaded | 43:37 | 1 | |
|
2023-12-24 | OWASP CRS and AppSensor Project | 43:18 | 1 | |
|
2023-12-24 | XSS & CSRF with HTML5 Attack, Exploit and Defense | 49:35 | 2 | |
|
2023-12-24 | The 7 Qualities of Highly Secure Software | 41:12 | 6 | |
|
2023-12-24 | Keynote The State of OWASP | 21:19 | 0 | |
|
2023-12-24 | The Magic of Symbiotic Security Creating an Ecosystem of Security Systems | 44:13 | 0 | |
|
2023-12-24 | Mobile Applications & Proxy Shenanigans | 29:32 | 1 | |
|
2023-12-24 | The Application Security Ponzi Scheme Stop Paying For Security Failure | 38:46 | 0 | |
|
2023-12-24 | Gaining Access to the Source Code & Server Side Memory Structure | 40:50 | 2 | |
|
2023-12-24 | The Same Origin Saga | 29:32 | 1 | |
|
2023-12-24 | How We Tear Into That Little Green Man | 38:44 | 3 | |
|
2023-12-24 | NoSQL, No Security | 37:36 | 0 | |
|
2023-12-24 | Top Strategies to Capture Security Intelligence for Applications | 32:58 | 0 | |
|
2023-12-24 | Gauntlt Rugged by Example | 42:04 | 1 | |
|
2023-12-24 | Original Sins | 44:14 | 0 | |
|
2023-12-24 | Top Ten Web Defenses | 39:50 | 2 | |
|
2023-12-24 | Get Off Your AMF and don't REST on JSON | 37:45 | 0 | |
|
2023-12-24 | Pining for the Fjords The Role of RBAC in Today s Applications | 44:55 | 0 | |
|
2023-12-24 | Unbreakable Oracle ERPs Attacks on Siebel & JD Edwards | 40:22 | 0 | |
|
2023-12-24 | Hack your way to a degree a new direction in teaching | 41:08 | 1 | |
|
2023-12-24 | Put Your Robots to Work Security Automation at Twitter | 38:22 | 0 | |
|
2023-12-24 | Unraveling Some of the Mysteries around DOM Based XSS | 45:49 | 0 | |
|
2023-12-24 | Hacking NET Applications Reverse Engineering 101 | 44:48 | 5 | |
|
2023-12-24 | Real World Cloud Application Security | 37:45 | 0 | |
|
2023-12-24 | Web App Crypto A Study in Failure | 31:09 | 0 | |
|
2023-12-24 | Hacking with Web Sockets | 36:59 | 5 | |
|
2023-12-24 | Rebooting Secure Software Development with Continuous Deployment | 44:23 | 1 | |
|
2023-12-24 | Web Framework Vulnerabilties | 53:13 | 0 | |
|
2023-12-24 | Reverse Engineering Secure HTTP API s With an SSL Proxy | 41:29 | 1 | |
|
2023-12-24 | Incident Response Security After Compromise | 42:26 | 0 | |
|
2023-12-24 | WTF WAF Testing Framework | 32:48 | 0 | |
|
2023-12-24 | Secure Code Reviews Magic or Art A Simplified Approach to Secure Code Reviews | 37:22 | 0 | Review |
|
2023-12-24 | Interactive Application Security TestingIAST, Beyond SAST DAST | 42:11 | 0 | |
|
2023-12-24 | Securing the SSL channel against man in the middle attacks | 36:28 | 0 | |
|
2023-12-24 | Iran s Real Life Cyberwar | 44:08 | 0 | |
|
2023-12-24 | Security at Scale | 45:57 | 0 | |
|
2023-12-24 | Keynote InfoSec at Ludicrious Speed Rugged DevOps and More | 45:30 | 0 | |
|
2023-12-24 | Spin the Bottle Coupling Technology and SE For One Awesome Hack | 47:14 | 0 | Vlog |
|
2023-12-24 | Keynote Securing Javascript | 39:19 | 0 | |
|
2023-12-24 | SQL Server Exploitation, Escalation and Pilfering | 44:19 | 1 | |
|
2023-12-24 | Keynote Some Lessons from the Trenches | 51:38 | 0 | |
|
2023-12-24 | Static Analysis of Java Class Files for Quickly and Accurately Detecting | 28:39 | 1 | |
|
2023-12-24 | Hacking and Defending iPhone Applications | 49:20 | 1 | |
|
2023-12-24 | OWASP Foundation Board Discussion | 35:33 | 0 | Discussion |
|
2023-12-24 | Top Ten Risks with Cloud that will keep you Awake at Night | 41:27 | 2 | |
|
2023-12-24 | Improve your SDLC with CAPEC and CWE | 34:59 | 0 | |
|
2023-12-24 | When Zombies Attack a Tracking Love Story | 47:30 | 5 | |
|