Parent directory/ | - | - |
AppSec USA 2023 captions/ | - | 2024 Nov 12 12:20 |
AI Red Teaming LLM Past, Present, and Future.mp4 | 48.9 MiB | 2024 Nov 10 22:57 |
ASVS Testing You Keep Using Those Words.mp4 | 37.9 MiB | 2024 Nov 10 22:57 |
AppSec Threats Deserve Their Own Incident Response Plan.mp4 | 25.6 MiB | 2024 Nov 10 22:57 |
Automated Security Testing with OWASP Nettacker.mp4 | 37.2 MiB | 2024 Nov 10 22:57 |
Better Protect Sensitive Data in the Cloud with Client-Side Application Layer Encryption.mp4 | 65.7 MiB | 2024 Nov 10 22:57 |
Bootstrap Your Software Security with OWASP SAMM 2.1.mp4 | 37.7 MiB | 2024 Nov 10 22:57 |
Could Passwordless be Worse than Passwords.mp4 | 27.8 MiB | 2024 Nov 10 22:57 |
Credential Sharing as a Service the Dark Side of No Code.mp4 | 30.4 MiB | 2024 Nov 10 22:57 |
Cutting to the chase Security Design and Guidance at scale.mp4 | 31.4 MiB | 2024 Nov 10 22:57 |
DevSecOps Worst Practices.mp4 | 64.6 MiB | 2024 Nov 10 22:57 |
Discovering Shadow Vulnerabilities in Popular Open-Source Projects A Journey Through Reverse-Fuzzing.mp4 | 29.4 MiB | 2024 Nov 10 22:57 |
Everything-as-Code Pushing the boundaries of SAST.mp4 | 45.0 MiB | 2024 Nov 10 22:57 |
Fishing for Security Reeling in Phishing Attacks Across a Global Organization.mp4 | 32.8 MiB | 2024 Nov 10 22:57 |
Fixing Broken Access Control.mp4 | 58.8 MiB | 2024 Nov 10 22:57 |
From SBOMs to F-Bombs Vulnerability Analysis, SCA Tools, and False Positives & Negatives.mp4 | 49.4 MiB | 2024 Nov 10 22:57 |
Hacking & Securing Android Applications.mp4 | 28.1 MiB | 2024 Nov 10 22:57 |
How to Avoid Potholes When Scaling Your Application Security Program.mp4 | 27.9 MiB | 2024 Nov 10 22:57 |
Ignoring the Hype How to Design Your Cloud Architecture Regardless of Your Cloud of Choice.mp4 | 32.0 MiB | 2024 Nov 10 22:57 |
Influencing Without Authority The Foundations of a Successful Security Department of Yes.mp4 | 40.4 MiB | 2024 Nov 10 22:57 |
Keynote 22 Years of Application Security - Where did it get us - Alyssa Miller.mp4 | 111.4 MiB | 2024 Nov 10 22:57 |
Keynote Global AppSec Beyond Boundaries - Brook S.E. Schoenfield.mp4 | 130.9 MiB | 2024 Nov 10 22:57 |
Keynote Profiling Socially-Motivated Cyber Criminals - Jackie Singh.mp4 | 89.0 MiB | 2024 Nov 10 22:57 |
Keynote Unsafe at Any Speed - Lisa Plaggemier.mp4 | 93.6 MiB | 2024 Nov 10 22:57 |
Level Up Your Security Champions (and Your Program).mp4 | 32.1 MiB | 2024 Nov 10 22:57 |
Metrics, metrics everywhere - from which ones I should be scared.mp4 | 47.4 MiB | 2024 Nov 10 22:57 |
Moving Forward By Looking Back Data Collection and Analysis at OWASP.mp4 | 29.9 MiB | 2024 Nov 10 22:57 |
No Code you shall use, malware you shall get.mp4 | 24.4 MiB | 2024 Nov 10 22:57 |
OSC&R - Open Software Supply Chain Attack Reference.mp4 | 34.1 MiB | 2024 Nov 10 22:57 |
OWASP Low-Code No-Code Top 10.mp4 | 24.6 MiB | 2024 Nov 10 22:57 |
Obfuscation Nation Detecting Malicious Dependencies at Scale with Static Analysis.mp4 | 39.3 MiB | 2024 Nov 10 22:57 |
OpenCRE.org - Universal Translator for Security.mp4 | 30.8 MiB | 2024 Nov 10 22:57 |
Policy-as-Code Across the Stack.mp4 | 45.8 MiB | 2024 Nov 10 22:57 |
Refactoring Mobile App Security.mp4 | 23.1 MiB | 2024 Nov 10 22:57 |
Reflections on Trust in the Software Supply Chain.mp4 | 43.9 MiB | 2024 Nov 10 22:57 |
Scaling Content Security Policy Enterprise Compliance and Third Party Resource Management.mp4 | 31.4 MiB | 2024 Nov 10 22:57 |
Shift Left Isn’t What You Expected.mp4 | 38.8 MiB | 2024 Nov 10 22:57 |
The State of Secure DevOps - Security enables Velocity.mp4 | 41.6 MiB | 2024 Nov 10 22:57 |
The evolution of exploiting memory vulnerabilities in Linux.mp4 | 29.3 MiB | 2024 Nov 10 22:57 |
Using WebAssembly to run, extend, and secure your application.mp4 | 41.4 MiB | 2024 Nov 10 22:57 |
Using an Application Performance Monitoring (APM) Environment for Security Insights.mp4 | 28.7 MiB | 2024 Nov 10 22:57 |
Zero Trust Threat Modeling.mp4 | 37.0 MiB | 2024 Nov 10 22:57 |