1. James Forshaw These Are My Principals, If You Don't like Them, I Have Others

    James Forshaw These Are My Principals, If You Don't like Them, I Have Others

  2. Maxim Goryachy, Dmitry Sklyarov, and Mark Ermolov Chip Red Pill

    Maxim Goryachy, Dmitry Sklyarov, and Mark Ermolov Chip Red Pill

  3. Responsibility for the Harm and Risk of Software Security Flaws 1 3

    Responsibility for the Harm and Risk of Software Security Flaws 1 3

    2
  4. OPA Language Support for a Sane, Safe and Secure Web 1 3

    OPA Language Support for a Sane, Safe and Secure Web 1 3

    2
  5. SmashFileFuzzer a New File Fuzzer Tool 2 2

    SmashFileFuzzer a New File Fuzzer Tool 2 2

    2
  6. Session Fixation the Forgotten Vulnerability 3 3

    Session Fixation the Forgotten Vulnerability 3 3

    2
  7. The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime

    The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime

  8. Can Kubernetes Keep a Secret Omer Levi Hevroni

    Can Kubernetes Keep a Secret Omer Levi Hevroni

  9. Offensive Threat Models Against the Supply Chain Tony UcedaVelez

    Offensive Threat Models Against the Supply Chain Tony UcedaVelez

  10. Vehicle Security Trends Implications for Automotive Suppliers AARON GUZMAN

    Vehicle Security Trends Implications for Automotive Suppliers AARON GUZMAN

  11. Keynote Cross Domain Theft and the Future of Browser Security 3 4

    Keynote Cross Domain Theft and the Future of Browser Security 3 4

  12. An Attacker's View of Serverless and GraphQL Apps Abhay Bhargav

    An Attacker's View of Serverless and GraphQL Apps Abhay Bhargav

  13. Black Clouds and Silver Linings in Node js Security LIRAN TAL

    Black Clouds and Silver Linings in Node js Security LIRAN TAL

  14. New Object Capabilities and Isolation of Untrusted Web Applications 3 3

    New Object Capabilities and Isolation of Untrusted Web Applications 3 3

  15. Common API Security Pitfalls PHILIPPE DE RYCK

    Common API Security Pitfalls PHILIPPE DE RYCK

  16. Uninvited Guests Understanding Malicious Web Bots with OWASP Handbook TIN ZAW

    Uninvited Guests Understanding Malicious Web Bots with OWASP Handbook TIN ZAW