Vídeos de OWASP AppSec Europa 2017
Perfecto para el fin de semana si no tienes nada planeado, ya están disponibles los vídeos de la OWASP AppSec Europa 2017:
- Conference Opening Address by Gary Robinson
- The Gift Of Feedback by Shannon Lietz
- Boosting The Security Of Your Angular 2 Application by Philippe De Ryck
- Don’t Trust The DOM: Bypassing XSS Mitigations Via Script Gadgets by Sebastian Lekies
- The Key Under The Doormat by Stephan Huber and Steven Arzt
- OWASP Juice Shop by Björn Kimminich
- Printer Security by Jens Müller and Vladislav Mladenov
- 2017: Rise Of The Machines by Kev D’Arcy, Nicholas Raite and Rohini Sulatycki
- Looking Back To Look Ahead by Brian Honan
- Making Vulnerability Management Suck Less With DefectDojo by Greg Ande
- Don’t Get Caught Em-bed by Aaron Guzman
- So We Broke All CSPs You Won’t Guess What Happened Next by Michele Spagnuolo
- Long Term Study On SSL TLS Certificates by Enrico Branca
- What Is A DevSecOps Engineer? by Helen Beal
- Security And The Self Contained Unit Of Software by Gareth Rushgrove
- I Am Not A Robot: Job Security In A DevSecOps World by Correy Voo
- Improving The Security Of Software Defined Infrastructures by Theodoor Scholte
- An SDLC For The DevSecOps Era by Zane Lackey
- Requirements Gathering For Succesful DevSecOps Pipeline by A Volkman and H Yasar
- Integrating Security In Agile Projects by Elena Kravchenko and Efrat Wasserman
- Secure DevOps Journey: A How To Guide by Peter Chestna
- Embedding GDPR Into The SDLC by Sebastien Deleersnyder and Siebe De Roovere
- Threat Modeling with PASTA by Tony UcedaVelez
- The Flaws In Hordes, The Security In Crowds by Mike Shema
- The Dark Side Of Search Engines Optimizations Campaigns by Or Katz
- The Evil Friend In Your Browser by Achim D Brucker
- Introducing The OWASP ModSecurity Core Rule Set 3 0 by Christian Folini
- What The Kidnapping And Ransom Economy Teaches Us About Ransomware by J Grossman
- Pentesting Voice Biometrics Solutions by Jakub Kaluzny
- How To Steal Mobile Wallet? by Wojtek Dworakowski and Slawomir Jasek
- Exploiting CORS Misconfigurations For Bitcoins And Bounties by James Kettle
- Analysis And Detection Of Authentication Cross Site Request Forgery by Luca Compagna
- Preventing 10 Common Security Mistakes In The MEAN Stack by David Bohannon
- On The (In-)Security Of JavaScript Object Signing And Encryption by Dennis Detering
- Everything Is Quantum! by Jaya Baloo
- Conference Closing Address by Gary Robinson
- How To Lead Better Security Through Our Mini Hardening Project by Kazuki Tsubo
- Security Best Practices In Azure Cloud by Viktorija Almazova
- Fixing Mobile AppSec: The OWASP Mobile Project by Bernhard Mueller and Sven Schleier
- The Path Of Secure Software by Katy Anton
- DNS Hijacking Using Cloud Providers: No Verification Needed by Frans Rosén
- Combining The Security Risks Of Native And Web Development Hybrid Apps
- The DevSecOps Playbook From A Practitioner’s Perspective by Shannon Lietz
- DevSecOps: A Rose By Any Other Name Would Smell Sweeter by Nigel Kersten
- Pushing Left Like A Boss: Application Security Foundations by Tanya Janca
- Security In The Land Of Microservices by Jack Mannino
- Application Security For DevSecOps by Joseph Feiman
- Securing The Continuous Integration Process by Irene Michlin
- Monitoring Attack Surface And Integrating Security Into DevOps Pipelines
- DevSec: Continuous Patch And Security Assessment With Inspec by Christoph Hartmann
- Creating An AppSec Pipeline With Containers In A Week by Jeroen Willemsen
- DevSecOps Roundup: An Overview Of The Current State Of DevSecOps
- Incremental Threat Modeling by Irene Michlin
- How To Put The Sec In DevOps by Helen Bravo
- Could A Few Lines Of Code F!#ck It All Up! by Erez Yalon
- An Introduction To Quantum Safe Cryptography by Liz O’Sullivan
- Dangerous Optimizations And The Loss Of Causality by Robert C Seacord
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec