Channels

  1. Trabalhando com Segurança de Software ou AppSec

    Trabalhando com Segurança de Software ou AppSec

  2. The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime

    The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime

  3. Vehicle Security Trends Implications for Automotive Suppliers AARON GUZMAN

    Vehicle Security Trends Implications for Automotive Suppliers AARON GUZMAN

  4. Black Clouds and Silver Linings in Node js Security LIRAN TAL

    Black Clouds and Silver Linings in Node js Security LIRAN TAL

  5. Common API Security Pitfalls PHILIPPE DE RYCK

    Common API Security Pitfalls PHILIPPE DE RYCK

  6. Uninvited Guests Understanding Malicious Web Bots with OWASP Handbook TIN ZAW

    Uninvited Guests Understanding Malicious Web Bots with OWASP Handbook TIN ZAW

  7. SmashFileFuzzer a New File Fuzzer Tool 1 2

    SmashFileFuzzer a New File Fuzzer Tool 1 2

    40
  8. Experience made in Technical Due Diligence

    Experience made in Technical Due Diligence

    29
  9. Promon TestSuite Client Based Penetration Testing Tool 2 3

    Promon TestSuite Client Based Penetration Testing Tool 2 3

    25
  10. How mXSS attacks change everything we believed to know so far

    How mXSS attacks change everything we believed to know so far

    22
  11. Keynote Angela s Top 10 list of reasons why users bypass security measures

    Keynote Angela s Top 10 list of reasons why users bypass security measures

    4
  12. Keynote Cryptography in Web Security Stupid, Broken, and maybe Working

    Keynote Cryptography in Web Security Stupid, Broken, and maybe Working

    6
  13. Product Security Management in Agile Product Management 3 3

    Product Security Management in Agile Product Management 3 3

    4
  14. Keynote The Security Development Lifecycle 3 4

    Keynote The Security Development Lifecycle 3 4

    4
  15. Secure Application Development for the Enterprise Practical, Real World Tips 1 3

    Secure Application Development for the Enterprise Practical, Real World Tips 1 3

    6
  16. Eradicating DNS Rebinding with the Extended Same Origin Policy

    Eradicating DNS Rebinding with the Extended Same Origin Policy

    4
  17. Samy Kamkar, AppSec California 2016, "Radio Hacking: Vehicles, Hardware, and more!"

    Samy Kamkar, AppSec California 2016, "Radio Hacking: Vehicles, Hardware, and more!"

    62
  18. Q Box and H Box Raspberry PI for the Infrastructure and Hacker

    Q Box and H Box Raspberry PI for the Infrastructure and Hacker

    6