2023-05-15 | Infosec In The New World Order Rugged DevOps And More Gene Kim | 45:14 | 14 | |
|
2023-05-15 | Matt Tesauro Keynote | 45:51 | 0 | |
|
2023-05-15 | Obfuscation in Javascript herrera | 40:17 | 2 | |
|
2023-05-15 | opensamm in the Real World Philip J Beyer, Scott Stevens | 49:31 | 0 | |
|
2023-05-15 | PCI, CWE topp 25 and OWASP top 10 bringing all together Nishi kumar, keith Turpin | 44:21 | 1 | |
|
2023-05-15 | Reversing Web Applications Andrew Wilson | 50:07 | 4 | |
|
2023-05-15 | SDL A History Michael Howard | 51:09 | 1 | |
|
2023-05-15 | Behavioral Security Modeling Eliminating Vulnerabilities by Building Predictable Systems | 38:04 | 1 | |
|
2023-05-15 | Principles of Patrolling, Applying Ranger School Lessons to Information Security with Patrick Tatro | 30:00 | 1 | Guide |
|
2023-05-15 | Web Application Security Payloads with Andres Riancho, RAPID 7 | 47:07 | 1 | |
|
2023-05-15 | Brakeman and Jenkins The Duo Detects Defects in Ruby on Rails Code with Justin Collins & Tin Zaw | 30:37 | 2 | |
|
2023-05-15 | Recap and Looking Ahead to the Next ten Years and Appsec USA 2012 | 11:04 | 1 | |
|
2023-05-15 | Hacking and Defending iPhone Applications with Keven Stadmeyer & Garrett Held, Trustwave SpiderLabs | 49:21 | 0 | |
|
2023-05-15 | You're Not Done Yet Turning Securable Apps into Secure Installations using SCAP with Charles Schmi | 42:07 | 0 | |
|
2023-05-15 | Community The Killer App with Mark Curphey, OWASP | 50:37 | 0 | |
|
2023-05-15 | Hacking NET Applications, The Black Arts with Jon McCoy, DigitalBodyGuard com | 1:01:35 | 2 | |
|
2023-05-15 | Secure Development Considerations for Cloud Virtual Environments with Andrew Murren | 36:33 | 0 | |
|
2023-05-15 | Coud Sec 12 Step with Adrian Lane, Securosis, LLC | 41:54 | 0 | |
|
2023-05-15 | Secure Programming Support in IDE with Bill Chu and Jing Xie | 46:35 | 0 | |
|
2023-05-15 | Emerging Threats in Mobile Computing with Adam Meyers SRA International | 50:41 | 2 | |
|
2023-05-15 | How To Recruit Spies on the Internet with Ira Winkler, CISSP | 48:52 | 3 | Guide |
|
2023-05-15 | Simplifying Threat Modeling with Mike Ware, Cigital | 43:33 | 1 | |
|
2023-05-15 | Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal | 44:15 | 2 | |
|
2023-05-15 | Implementing AppSensor in ModSecurity with Ryan Barnett, Trustwave SpiderLabs | 43:19 | 1 | |
|
2023-05-15 | Six Key Metrics A Look at the Future of AppSec with Arian Evans | 37:52 | 0 | |
|
2023-05-15 | Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall, ESAPI Project co owner | 15:51 | 0 | |
|
2023-05-15 | Improve your SDLC with CAPEC and CWE with Ryan Stinson, KCG | 34:59 | 1 | |
|
2023-05-15 | Ghosts of XSS Past, Present & Future with Jim Manico, WhiteHat Security | 48:25 | 0 | |
|
2023-05-15 | Keeping Up with the Web Application Security with Ganesh Devarajan & Todd Redfoot | 46:44 | 0 | |
|
2023-05-15 | Software Assurance Automation Throughout the Lifecycle with Richard Struse | 48:03 | 0 | |
|
2023-05-15 | Gray, the New Black, Gray Box Vulnerability Testing with Brian Chess, Ph D | 36:21 | 0 | |
|
2023-05-15 | Lesson Learned Building Secure ASP NET Applications with Tom Fischer | 42:59 | 0 | | Lesson Learned
|
2023-05-15 | An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts | 57:20 | 2 | |
|
2023-05-15 | Software Security Is OK Good Enough with John B Dickson, CISSP | 39:55 | 2 | |
|
2023-05-15 | Messaging Security Using GlassFish & Open Message Queue with Srini Penchikala | 39:46 | 1 | |
|
2023-05-15 | SSL And The Future of Authenticity with Moxie Marlinspike Keynote | 44:52 | 0 | |
|
2023-05-15 | Mobile Web Services with Gunnar Peterson | 45:32 | 0 | |
|
2023-05-15 | Android Security, or this is not the kind of 'open' I meant with Mike Park, Trustwave SpiderLabs | 41:13 | 0 | |
|
2023-05-15 | STAAF An Efficient Distributed Framework for Performing Large Scale Android Application Analysis | 48:01 | 0 | |
|
2023-05-15 | Application Security & User Experience with Alex Smolen | 39:15 | 0 | |
|
2023-05-15 | Next Generation Web Attacks HTML 5, DOM L3 and XHR L2 with Shreeraj Shah, Blueinfy Solutions Pvt | 49:59 | 1 | |
|
2023-05-15 | Application Security Advisory Board SDLC Panel Fuchsberger, Kumar, Tychansky and Moretti | 50:07 | 0 | |
|
2023-05-15 | OWASP Foundation Board Discussion with Williams, Brennan, Keary, Tesauro, Wichers and Coates | 35:33 | 2 | Discussion |
|
2023-05-15 | Sticking to the Facts Scientific Study of Static Analysis Tools with Britton Willis | 52:32 | 0 | |
|
2023-05-15 | OWASP Top 10 Mobile Risks with Jack Mannino, Mike Zusman & Zach Lanier | 47:31 | 0 | |
|
2023-05-15 | Testing from the Cloud Is the sky falling with Matt Tesauro, OWASP Foundation Board Member | 18:43 | 0 | |
|
2023-05-15 | Application Security Debt and Application Interest Rates with Chris Wysopal, Veracode | 35:26 | 1 | |
|
2023-05-15 | The Good Hacker Dismantling Web Malware with Aditya K Sood & Richard J Enbody | 46:52 | 0 | |
|
2023-05-15 | AppSec Inception Exploiting Software Culture with Jeff Williams, Aspect Security, CEO | 36:16 | 1 | |
|
2023-05-15 | Panel Discussion Making it in Information Security & Application Security | 45:25 | 1 | Discussion |
|
2023-05-15 | Top Ten Risks with Cloud That Will Keep You Awake at Night with Shankar B Chebrolu | 41:30 | 1 | |
|
2023-05-13 | The Security and Privacy of Home Automation Systems | 55:58 | 5 | |
|
2023-05-13 | Dismal Code Studying the Evolution of Security Bugs | 31:57 | 6 | |
|
2023-05-13 | Is it the typeset or the type of statistics Disfluent font does not reduce self disclosure | 50:58 | 3 | |
|
2023-05-13 | The Higgs Boson Discovery, Certainty and Uncertainty, Communication and Replication | 1:12:04 | 4 | |
|
2023-05-13 | Statistics Done Wrong Pitfalls of Experimentation | 1:08:02 | 1 | |
|
2023-05-13 | Text Entry Method Affects Password Security | 43:08 | 1 | |
|
2023-05-13 | The Dirty Secrets of SOCs Anthropology, Primitive Societies, and Security Operations Centers | 54:21 | 0 | Vlog |
|
2023-05-13 | What Does it Mean to Do Science, and Are We Doing It | 55:29 | 3 | |
|
2023-05-13 | Why Does Reproducibility in Computation Science Deserve Our Attention | 1:07:51 | 0 | |
|
2023-05-13 | A Calibration Methodology for Networked Cybersecurity | 49:14 | 1 | Vlog |
|
2023-05-13 | Clusters and Markers for Keystroke Typing Rhythms | 57:45 | 1 | |
|
2023-05-13 | How Did We Get Into This Mess, and How Will We Get Out | 1:04:53 | 0 | |
|
2023-05-13 | Noel Tautges Connecting Information via User Account Recovery and Filling in the Blanks | 27:09 | 0 | Guide |
|
2023-05-13 | Tracy Z Maleeff InfoSecSherpa An Introduction to Legal, Government, and Business Research | 52:47 | 1 | |
|
2023-05-13 | Patrick McNeil The Right Way to Do Wrong Physical Security Secrets of Criminals and Professionals | 53:09 | 2 | |
|
2023-05-13 | Paul Asadoorian Social Engineering Your Way to an Infosec Career | 56:34 | 3 | |
|
2023-05-13 | Whitney Maxwell An Analysis of the Size and Impact of Digital Footprints | 28:46 | 1 | |
|
2023-05-13 | Whitney Maxwell & Chris Kirsch SE CTF Call Re Enactment | 22:07 | 3 | |
|
2023-05-13 | Sarka Facial Expressions Behind Social Engineering Attacks | 45:01 | 2 | |
|
2023-05-13 | Tinker Secor Transitive Trust Pivoting and Escalating Privileges in a Social Engineering Scenario | 43:36 | 3 | |
|
2023-05-13 | Social Engineering CTF Winners Panel | 51:08 | 5 | |
|
2023-05-13 | Tigran Terpandjian Cultivating a 'Renaissance Approach' for the Social Engineer | 17:39 | 1 | |
|
2023-05-13 | Chris Hadnagy So You Wanna Be a Social Engineer | 56:23 | 2 | |
|
2023-05-13 | Chris Kirsch Pickpocketing Competition Wait, where is my access badge | 59:55 | 7 | |
|
2023-05-13 | Emilie St Pierre & Robby Stewart A Proven Methodology for OSINT Gathering and Social Engineering | 50:12 | 4 | Vlog |
|
2023-05-13 | Ira Winkler How to Make Social Engineering Simulations Actually Useful | 55:52 | 1 | Guide |
|
2023-05-13 | Jonathan Stines Make Vishing Suck Less | 51:07 | 1 | |
|
2023-05-13 | Kate Mullin Social Engineering from a CISO's Perspective | 41:20 | 0 | |
|
2023-05-13 | Krittika Lalwaney & David Cafaro Social Engineering for Red and Blue Teams | 47:57 | 0 | |
|
2023-05-13 | Micah Hoffman Getting the Good Stuff Understanding the Web to Achieve Your OSINT Goals | 50:17 | 4 | |
|
2023-05-13 | Michael Portera @mportatoes Venemy An Intelligence Tool for Venmo | 30:04 | 2 | |
|
2023-05-13 | Whitney Maxwell, Rapid7 | 11:37 | 1 | |
|
2023-05-13 | Helen Negre | 9:59 | 1 | |
|
2023-05-13 | Ira Winkler, Secure Mentem | 13:53 | 1 | |
|
2023-05-13 | Joe Gray | 10:43 | 0 | |
|
2023-05-13 | Michael James | 5:09 | 0 | |
|
2023-05-13 | Susan Peediyakkal | 7:43 | 0 | |
|
2023-05-13 | Tracy Maleeff, @InfoSecSherpa | 9:38 | 1 | |
|
2023-05-13 | Joseph Sarkisian JUST JUMP Lessons For WannaBe Social Engineers By A WannaBe Social Engineer | 24:30 | 1 | |
|
2023-05-13 | Rae Baker OSINT On The Ocean Maritime Intelligence Gathering | 26:14 | 2 | |
|
2023-05-13 | Krittika Lalwaney What E Holmes And Oprah Have In Common 4 Effective Ways To Build Instant Rapport | 27:15 | 2 | |
|
2023-05-13 | Shane McCombs A Practical Application of OSINT in a Dark World Trigger Warning | 27:06 | 4 | |
|
2023-05-13 | Lauren Brennan Disappearing Act Can You Avoid Public Surveillance Cameras | 22:01 | 3 | |
|
2023-05-13 | Zeshan Aziz Using OSINT And NLP To Track Jihadists In Conflict Zones | 51:23 | 1 | |
|
2023-05-13 | Maureen Gibbons Varela Painting a Portrait of an Individual with OSINT | 54:53 | 0 | |
|
2023-05-13 | Zoey Selman The Misconceptions Of Open Source Intelligence | 49:38 | 0 | |
|
2023-05-13 | Micah Hoffman Git’ing Users For OSINT Analysis Of All GitHub Users | 46:44 | 4 | |
|
2023-05-13 | Rachel Bleiman & Wilson Diaz Undergraduate Student Experiences In Social Engineering | 42:30 | 1 | |
|
2023-05-13 | Alethe Denis Phishy Little Liars Pretexts That Kill | 49:28 | 0 | |
|