1. Nokia & Schneider Electric Investigate Data Breach, MoneyGram Replaces CEO, Spyware Legal Barriers

    Nokia & Schneider Electric Investigate Data Breach, MoneyGram Replaces CEO, Spyware Legal Barriers

    56
  2. OWASP Top Ten Proactive Controls Jim Manico

    OWASP Top Ten Proactive Controls Jim Manico

    2
    0
    1
  3. An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts

    An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts

    3
  4. Marion Leader Ep 65 Tina folds on Tolls, Short session recap, and The ORP SCC meeting this weekend.

    Marion Leader Ep 65 Tina folds on Tolls, Short session recap, and The ORP SCC meeting this weekend.

    9
    0
    341
    2
  5. Daniel Miessler: Future of AI, Finding Purpose, & Recruiting - Imperial Security Bureau Podcast 12

    Daniel Miessler: Future of AI, Finding Purpose, & Recruiting - Imperial Security Bureau Podcast 12

    13
  6. MELHOR TÉCNICA DE APRENDIZADO PARA ESTUDAR? Implemente imediatamente!

    MELHOR TÉCNICA DE APRENDIZADO PARA ESTUDAR? Implemente imediatamente!

    6
    1
    39
  7. Master Kali Linux(or Linux) in 60 Minutes

    Master Kali Linux(or Linux) in 60 Minutes

    22
  8. How mXSS attacks change everything we believed to know so far

    How mXSS attacks change everything we believed to know so far

    48
  9. Making Security Tools accessible for Developers

    Making Security Tools accessible for Developers

    32
  10. Rooting your internals Inter Protocol Exploitation, custom shellcode and BeEF

    Rooting your internals Inter Protocol Exploitation, custom shellcode and BeEF

    21
  11. Content Security Policy the panacea for XSS or placebo

    Content Security Policy the panacea for XSS or placebo

    20
  12. Q Box and H Box Raspberry PI for the Infrastructure and Hacker

    Q Box and H Box Raspberry PI for the Infrastructure and Hacker

    17
  13. PCI, CWE topp 25 and OWASP top 10 bringing all together Nishi kumar, keith Turpin

    PCI, CWE topp 25 and OWASP top 10 bringing all together Nishi kumar, keith Turpin

    7
  14. Precision Timing Attacking browser privacy with SVG and CSS

    Precision Timing Attacking browser privacy with SVG and CSS

    2
  15. Keynote Secure all the things fiction from the Web s immediate future

    Keynote Secure all the things fiction from the Web s immediate future

    9
  16. Lightning Talk Creating Accessible Security Testing with ZAP

    Lightning Talk Creating Accessible Security Testing with ZAP

    2
  17. Keynote Angela s Top 10 list of reasons why users bypass security measures

    Keynote Angela s Top 10 list of reasons why users bypass security measures

    6