August 2019
Security
[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov
Alexei Kojenov
August 2019
Security
An Infosec Timeline: Noteworthy Events From 1970 To 2050 - Mario Heiderich
Mario Heiderich
August 2019
Security
Breaches Are Everywhere. What’s A Good Security Leader To Do?! - Richard Greenberg
Richard Greenberg
August 2019
Security
Choosing The Right Static Code Analyzers Based On Hard Data - Chris Horn
Chris Horn
August 2019
Security
Do Certain Types Of Developers Or Teams Write More Secure Code? - Anita Damico
Anita Damico
August 2019
Security
Exploiting Hardware Glitches And Side Channels In Perfect Software - Herbert Bos
Herbert Bos
August 2019
Security
Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide - Jeroen Willemsen
Jeroen Willemsen
August 2019
Security
How Do JavaScript Frameworks Impact The Security Of Applications? - Ksenia Peguero
Ksenia Peguero
August 2019
Security
How I Could Have Stolen Your Photos From Google - Gergo Turcsanyi
Gergo Turcsanyi
August 2019
Security
How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security - Peter Hauschulz
Peter Hauschulz
August 2019
Security
How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning
Sam Lanning
August 2019
Security
HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle
James Kettle
August 2019
Security
Mobile- Or Attacker-Friendly? A Security Evaluation Of Mobile-First Websites - Tom Van Goethem
Tom Van Goethem
August 2019
Security
OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya Bhatt
Chaitanya Bhatt
August 2019
Security
OWASP SAMM2: Your Dynamic Software Security Journey - Sebastien Deleersnyder
Sebastien Deleersnyder
August 2019
Security
Practical OWASP CRS In High Security Settings - Christian Folini
Christian Folini
August 2019
Security
Restricting The Scripts, You're To Blame, You Give CSP A Bad Name - Sebastian Roth and Ben Stock
Sebastian Roth and Ben Stock
August 2019
Security
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices - Marius Musch and Martin Johns
Marius Musch and Martin Johns
August 2019
Security
SUSTO: Systematic Universal Security Testing Orchestration - Luis Saiz
Luis Saiz
August 2019
Security
The Insecurity Caused By Trusting Your Client-Side Storage - Ben Stock and Marius Steffens
Ben Stock and Marius Steffens
August 2019
Security
The Security We Need: Designing Usable IoT Security - Damilare D. Fagbemi
Damilare D. Fagbemi
August 2019
Security
The State Of Credential Stuffing And The Future Of Account Takeovers - Jarrod Overson
Jarrod Overson
August 2019
Security
The Woman Who Squashed Terrorists: When An Embassy Gets Hacked - Chris Kubecka
Chris Kubecka
August 2019
Security
Threat Modelling Stories From The Trenches - David Johannson and Andrew Lee-Thorp
David Johannson and Andrew Lee-Thorp
August 2019
Security
Unlikely Allies: How HR Can Help Build A Security-First Culture - Alison Eastaway
Alison Eastaway
August 2019
Security
Web Apps vs Blockchain DApps (Smart Contracts): Tools, Vulns And Standards - Damian Rusinek
Damian Rusinek
August 2019
Security
WebAuthn: Strong Authentication vs Privacy vs Convenience - Suby Raman
Suby Raman