1. The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime

    The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime

  2. Vehicle Security Trends Implications for Automotive Suppliers AARON GUZMAN

    Vehicle Security Trends Implications for Automotive Suppliers AARON GUZMAN

  3. Black Clouds and Silver Linings in Node js Security LIRAN TAL

    Black Clouds and Silver Linings in Node js Security LIRAN TAL

  4. Common API Security Pitfalls PHILIPPE DE RYCK

    Common API Security Pitfalls PHILIPPE DE RYCK

  5. Uninvited Guests Understanding Malicious Web Bots with OWASP Handbook TIN ZAW

    Uninvited Guests Understanding Malicious Web Bots with OWASP Handbook TIN ZAW

  6. Daniel Miessler: Future of AI, Finding Purpose, & Recruiting - Imperial Security Bureau Podcast 12

    Daniel Miessler: Future of AI, Finding Purpose, & Recruiting - Imperial Security Bureau Podcast 12

    13
  7. Running at 99% Surviging an Application DoS Ryan Huber

    Running at 99% Surviging an Application DoS Ryan Huber

    1
  8. Owning Oracle Sessions and Credentials 1 3

    Owning Oracle Sessions and Credentials 1 3

    10
  9. Netflix's Layered Approach to Reducing Risk of Credential Compromise

    Netflix's Layered Approach to Reducing Risk of Credential Compromise

    9
  10. 7 Deadly Sins Unlock the Gates of Mobile Hacking Heaven Dan Kuykendall

    7 Deadly Sins Unlock the Gates of Mobile Hacking Heaven Dan Kuykendall

    1
  11. adventures in reviewing mountains of code jon boyd

    adventures in reviewing mountains of code jon boyd

  12. Responsibility for the Harm and Risk of Software Security Flaws 1 3

    Responsibility for the Harm and Risk of Software Security Flaws 1 3

    2
  13. OPA Language Support for a Sane, Safe and Secure Web 1 3

    OPA Language Support for a Sane, Safe and Secure Web 1 3

    2
  14. SmashFileFuzzer a New File Fuzzer Tool 2 2

    SmashFileFuzzer a New File Fuzzer Tool 2 2

    2
  15. Session Fixation the Forgotten Vulnerability 1 3

    Session Fixation the Forgotten Vulnerability 1 3

    2
  16. Session Fixation the Forgotten Vulnerability 3 3

    Session Fixation the Forgotten Vulnerability 3 3

    2
  17. Can Kubernetes Keep a Secret Omer Levi Hevroni

    Can Kubernetes Keep a Secret Omer Levi Hevroni

  18. Offensive Threat Models Against the Supply Chain Tony UcedaVelez

    Offensive Threat Models Against the Supply Chain Tony UcedaVelez

  19. An Attacker's View of Serverless and GraphQL Apps Abhay Bhargav

    An Attacker's View of Serverless and GraphQL Apps Abhay Bhargav