1. HTTPS Based Clustering for Assisted Cybercrime Investigations

    HTTPS Based Clustering for Assisted Cybercrime Investigations

    4
  2. Eradicating DNS Rebinding with the Extended Same Origin Policy

    Eradicating DNS Rebinding with the Extended Same Origin Policy

    10
  3. Qualitative Comparison of SSL Validation Alternatives

    Qualitative Comparison of SSL Validation Alternatives

    6
  4. MalloDroid, Hunting Down Broken SSL in Android Apps

    MalloDroid, Hunting Down Broken SSL in Android Apps

    1
  5. Running at 99% Surviging an Application DoS Ryan Huber

    Running at 99% Surviging an Application DoS Ryan Huber

    1
  6. S07E05 - Navigating AI in Application Security: Insights from Kyle Hankins

    S07E05 - Navigating AI in Application Security: Insights from Kyle Hankins

    17
  7. Netflix's Layered Approach to Reducing Risk of Credential Compromise

    Netflix's Layered Approach to Reducing Risk of Credential Compromise

    9
  8. Making Continuous Security a Reality with OWASP's

    Making Continuous Security a Reality with OWASP's

  9. Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal

    Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal

  10. Community The Killer App with Mark Curphey, OWASP

    Community The Killer App with Mark Curphey, OWASP

  11. 7 Deadly Sins Unlock the Gates of Mobile Hacking Heaven Dan Kuykendall

    7 Deadly Sins Unlock the Gates of Mobile Hacking Heaven Dan Kuykendall

    1
  12. adventures in reviewing mountains of code jon boyd

    adventures in reviewing mountains of code jon boyd