Vídeos de la OWASP AppSec Europa 2015
Ya están disponibles los vídeos de la OWASP AppSec Europa 2015 celebrada en Amsterdam del 19 al 22 de mayo.
- Martin Knobloch - Opening ceremony
- Joshua Corman - Continuous Acceleration: Why Continuous Everything Requires A Suppl...
- Nicolas Gregoire - Server-Side Browsing Considered Harmful
- Yossi Daya - Rise Of The Machines - How Automated Processes Overtook the Web
- Aaron Weaver - Building An AppSec Pipeline: Keeping Your Program, And Your Life, Sane
- Andrew Lee-Thorp - So, You Want To Use A WebView? [BAD AUDIO]
- Dirk Wetter - Security And Insecurity Of HTTP Headers
- Carsten Huth, Nadim Barsoum, Dawid Sroka - Security Touchpoints When Acquiring Soft...
- L. Desmet, M. Johns - WebRTC, Or How Secure Is P2P Browser Communication? [BAD AUDIO]
- Rory Mccune - Security And Modern Software Deployment
- Paul Malone - Implementing A User-Centric Datastore
- Helen McLaughlin - Can Saas Ever Be Secure?
- David Vaartjes - Agile Security Testing - Lessons Learned
- Wojtek Dworakowski - E-Banking Transaction Authorization - Common Vulnerabilities, ...
- Hans Folmer - Security is Part Of The DNA Of A Defense Organization
- Christian Schneider - Security DevOps - Staying Secure In Agile Projects
- Steve Lord - Securing The Internet Of Things
- Dan Cornell - Mobile Application Assessments By The Numbers: A Whole-istic View
- Thibault Koechlin - Naxsi, A Web Application Firewall for NGINX
- Frederik Braun - Using A JavaScript CDN That Can Not XSS You - With Subresource Int...
- Tom Van Goethem - Issues And Limitations Of Third Party Security Seals
- Alex Infuhr - PDF - Mess With The Web
- Dmitry Savintsev - Finding Bad Needles On A Worldwide Scale
- Brenno De Winter - The Software Not The Human Is The Weakest Link
- Luca De Fulgentis - Windows Phone App Security For Builders And Breakers
- Tobias Gondrom, Jaya Baloo, Dr. Melanie Rieback, Dhillon Andrew Kannabhiran - Women...
- Matt Tesauro - Lessons From DevOps: Taking DevOps Practices Into Your AppSec Life
- Tobias Gondrom - From Zero To Hero - Or How OWASP Saved My Holiday
- Jim Manico - HTTPS Is Better than Ever Before. Now Its Your Turn.
- Jonathan Cran - Hard Knock Lessons On Bug Bounties
- Ange Albertini - Preserving Arcade Games
- Mario Heiderich - Copy Pest - A Case Study On The ClipBoard, Blind Trust And Invis...
- Gareth Heyes - XSS Horror Show
- Matt Johansen, Johnathan Kuskos - The Top 10 Web Hacks of 2014
- Troy Hunt - 50 Shades of AppSec
- Greg Patton - The API Assessment Primer
- Florian Stahl, Stefan Burgmair - OWASP Top 10 Privacy Risks
- Martin Knobloch, Tobias Gondrom - Opening ceremony
- Michele Spagnuolo - Abusing JSONP With Rosetta Flash
- Frank Breedijk - Red Team, Blue Team Or White Cell? Trends In IT And How They Force...
- Eduardo Vela Nava - Web Service Workers - Breaking The Web Because It Would Be A Sh...
- Simon Bennetts - OWASP ZAP: More Advanced Features
- Matias Madou, Daan Raman - If 6,000 Mobile Malware Applications Could Talk! Ow, The...
- Achim D. Brucker - Bringing Security Testing To Development: How To Enable Develop...
- Michele Orru - Dark Fairytales From A Phisherman
- Marek Zachara - Collective Detection Of Harmful Requests
- Or Katz, Ezra Caltum - Maliciously Monetizing AppSec Feature. Its All About The Money.
- Ian Haken - Security Policy Management: Easy as PIE
- Martin Johns, Sebastian Lekies, Ben Stock - Client-Side Protection Against DOM-Base...
- Maty Siman - The Node.js Highway: Attacks Are At Full Throttle
- Conference Team - Closing ceremony
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec