
August 2019
Security
![[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov](https://i3.ytimg.com/vi/Y0QxwRyqlh8/hqdefault.jpg)
![[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov](https://i3.ytimg.com/vi/Y0QxwRyqlh8/hqdefault.jpg)
[In]secure Deserialization, And How [Not] To Do It - Alexei Kojenov
Alexei Kojenov
August 2019
Security


An Infosec Timeline: Noteworthy Events From 1970 To 2050 - Mario Heiderich
Mario Heiderich
August 2019
Security


Breaches Are Everywhere. What’s A Good Security Leader To Do?! - Richard Greenberg
Richard Greenberg
August 2019
Security


Choosing The Right Static Code Analyzers Based On Hard Data - Chris Horn
Chris Horn
August 2019
Security


Do Certain Types Of Developers Or Teams Write More Secure Code? - Anita Damico
Anita Damico
August 2019
Security


Exploiting Hardware Glitches And Side Channels In Perfect Software - Herbert Bos
Herbert Bos
August 2019
Security


Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide - Jeroen Willemsen
Jeroen Willemsen
August 2019
Security


How Do JavaScript Frameworks Impact The Security Of Applications? - Ksenia Peguero
Ksenia Peguero
August 2019
Security


How I Could Have Stolen Your Photos From Google - Gergo Turcsanyi
Gergo Turcsanyi
August 2019
Security


How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security - Peter Hauschulz
Peter Hauschulz
August 2019
Security


How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning
Sam Lanning
August 2019
Security


HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle
James Kettle
August 2019
Security


Mobile- Or Attacker-Friendly? A Security Evaluation Of Mobile-First Websites - Tom Van Goethem
Tom Van Goethem
August 2019
Security


OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya Bhatt
Chaitanya Bhatt
August 2019
Security


OWASP SAMM2: Your Dynamic Software Security Journey - Sebastien Deleersnyder
Sebastien Deleersnyder
August 2019
Security


Practical OWASP CRS In High Security Settings - Christian Folini
Christian Folini
August 2019
Security


Restricting The Scripts, You're To Blame, You Give CSP A Bad Name - Sebastian Roth and Ben Stock
Sebastian Roth and Ben Stock
August 2019
Security


ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices - Marius Musch and Martin Johns
Marius Musch and Martin Johns
August 2019
Security


SUSTO: Systematic Universal Security Testing Orchestration - Luis Saiz
Luis Saiz
August 2019
Security


The Insecurity Caused By Trusting Your Client-Side Storage - Ben Stock and Marius Steffens
Ben Stock and Marius Steffens
August 2019
Security


The Security We Need: Designing Usable IoT Security - Damilare D. Fagbemi
Damilare D. Fagbemi
August 2019
Security


The State Of Credential Stuffing And The Future Of Account Takeovers - Jarrod Overson
Jarrod Overson
August 2019
Security


The Woman Who Squashed Terrorists: When An Embassy Gets Hacked - Chris Kubecka
Chris Kubecka
August 2019
Security


Threat Modelling Stories From The Trenches - David Johannson and Andrew Lee-Thorp
David Johannson and Andrew Lee-Thorp
August 2019
Security


Unlikely Allies: How HR Can Help Build A Security-First Culture - Alison Eastaway
Alison Eastaway
August 2019
Security


Web Apps vs Blockchain DApps (Smart Contracts): Tools, Vulns And Standards - Damian Rusinek
Damian Rusinek
August 2019
Security


WebAuthn: Strong Authentication vs Privacy vs Convenience - Suby Raman
Suby Raman