Aug 2019Security An Infosec Timeline: Noteworthy Events From 1970 To 2050 - Mario HeiderichMario Heiderich
Aug 2019Security Being Powerful While Powerless: Elevating Security By Leading Without Authority - Nathan YeeNathan Yee
Aug 2019Security Breaches Are Everywhere. What’s A Good Security Leader To Do?! - Richard GreenbergRichard Greenberg
Aug 2019Security Do Certain Types Of Developers Or Teams Write More Secure Code? - Anita DamicoAnita Damico
Aug 2019Security Exploiting Hardware Glitches And Side Channels In Perfect Software - Herbert BosHerbert Bos
Aug 2019Security Fast Forwarding Mobile Security With The OWASP Mobile Security Testing Guide - Jeroen WillemsenJeroen Willemsen
Aug 2019Security How Do JavaScript Frameworks Impact The Security Of Applications? - Ksenia PegueroKsenia Peguero
Aug 2019Security How Scripting In ZAP Can Bridge The Gap Between Dev Teams And Security - Peter HauschulzPeter Hauschulz
Aug 2019Security How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam LanningSam Lanning
Aug 2019Security Mobile- Or Attacker-Friendly? A Security Evaluation Of Mobile-First Websites - Tom Van GoethemTom Van Goethem
Aug 2019Security OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya BhattChaitanya Bhatt