31:21
OWASP API Security Project - Paulo Silva & Erez Yalon
593 views • 2 weeks ago
47:21
From Theory To Practice: Navigating The Challenges Of Vulnerability Research - Raphael Silva
121 views • 2 weeks ago
1:54
Closing Ceremony - OWASP Board
37 views • 2 weeks ago
45:37
What Can Traditional Web App Security Learn From Browser Wallet Extensions? - Gal Weizman
94 views • 2 weeks ago
39:54
5 AppSec Stories, And What We Can Learn From Them - Paul Molin
92 views • 2 weeks ago
29:58
OWASP SamuraiWTF - Kevin Johnson
59 views • 2 weeks ago
48:03
Dawn Of The Dead: The Tale Of The Resurrected Domains - Pedro Fortuna
133 views • 2 weeks ago
22:38
OWASP Coraza Web Application Firewalls Revisited - José Carlos Chávez
183 views • 2 weeks ago
31:46
OWASP SAMM: Interactive Introduction And Update - Seba Deleersnyder & Bart De Win
94 views • 2 weeks ago
47:45
Growing A Security Champion Program Into A Security Powerhouse - Bonnie Viteri
318 views • 2 weeks ago
38:26
Cloud-Squatting: The Never-ending Misery Of Deleted & Forgotten Cloud Assets - Abdullah Al-Sultani
275 views • 2 weeks ago
38:05
Exploiting Client-Side Path Traversal: CSRF Is Dead, Long Live CSRF - Maxence Schmitt
118 views • 2 weeks ago
39:55
'The Rise And Fall' Of ModSecurity And The OWASP Core Rule Set - Davide Ariu
54 views • 2 weeks ago
54:21
Deterministic GenAI Outputs With Provenance - Dinis Cruz
46 views • 2 weeks ago
37:02
Build Strong Defenses By Participating In Standards! - Daniel Ehrenberg
53 views • 2 weeks ago
47:04
I Can’t Cope! How OWASP Is Helping To Manage Vulnerability Overload - Anthony Harrison
67 views • 2 weeks ago
26:44
Securing The Gateway And Mitigating Risks In LLM API Integration - Ayush Agarwal & Avneesh Hota
93 views • 2 weeks ago
13:47
OWASP Developer Guide - Shruti Kulkarni
43 views • 2 weeks ago
41:30
XZ Backdoor: Navigating The Complexities Of Supply Chain Attacks Detected By Accident - Yoad Fekete
61 views • 2 weeks ago
48:01
Assessing 3rd Party Libraries More Easily With Security Scorecards - Niels Tanis
76 views • 2 weeks ago
23:40
OWASP Dependency Track Fortifying The Supply Chain - Aravind Parappil & Vinod Anandan
92 views • 2 weeks ago
45:51
How (Not) To Implement Secure Digital Identity: Study Of Poland's Digital ID System - Szymon Chadam
70 views • 2 weeks ago
43:05
Designing Security And Privacy: A Dev's Guide To Threat Modeling With OWASP SAMM - Seba Deleersnyder
70 views • 2 weeks ago
56:10
Building An Effective Application Penetration Testing Team - Ryan Armstrong
132 views • 2 weeks ago
39:14
OWASP Cornucopia - Johan Sydseter
81 views • 2 weeks ago
26:32
OWASP Dep-scan - Prabhu Subramanian
91 views • 2 weeks ago
50:24
Winning Buy-In: Mastering The Art Of Communicating Security To Management - Ida Hameete
27 views • 2 weeks ago
49:37
Malice In Chains: Supply Chain Attacks Using Machine Learning Models - Tom Bonner & Marta Janus
45 views • 2 weeks ago
11:25
OWASP Top-25 Parameters - Lütfü Mert Ceylan
55 views • 2 weeks ago
48:41
Token It Up A Notch: Elevating Payment Security - Yadi Abdalhalim & Jovon Itwaru
44 views • 2 weeks ago
Load More