1. 7 Deadly Sins Unlock the Gates of Mobile Hacking Heaven Dan Kuykendall

    7 Deadly Sins Unlock the Gates of Mobile Hacking Heaven Dan Kuykendall

    1
  2. adventures in reviewing mountains of code jon boyd

    adventures in reviewing mountains of code jon boyd

  3. Responsibility for the Harm and Risk of Software Security Flaws 1 3

    Responsibility for the Harm and Risk of Software Security Flaws 1 3

    2
  4. OPA Language Support for a Sane, Safe and Secure Web 1 3

    OPA Language Support for a Sane, Safe and Secure Web 1 3

    2
  5. Session Fixation the Forgotten Vulnerability 3 3

    Session Fixation the Forgotten Vulnerability 3 3

    2
  6. Can Kubernetes Keep a Secret Omer Levi Hevroni

    Can Kubernetes Keep a Secret Omer Levi Hevroni

  7. Offensive Threat Models Against the Supply Chain Tony UcedaVelez

    Offensive Threat Models Against the Supply Chain Tony UcedaVelez

  8. An Attacker's View of Serverless and GraphQL Apps Abhay Bhargav

    An Attacker's View of Serverless and GraphQL Apps Abhay Bhargav

  9. Cyber Insurance A Primer for Infosec Nicole Becher

    Cyber Insurance A Primer for Infosec Nicole Becher

  10. Leveraging Users' Engagement to Improve Account Security Amine Kamel

    Leveraging Users' Engagement to Improve Account Security Amine Kamel

  11. Securing Third Party Applications at Scale Ryan Flood & Prashanth Kannan

    Securing Third Party Applications at Scale Ryan Flood & Prashanth Kannan

  12. Keynote Talent matters You matter Caroline Wong

    Keynote Talent matters You matter Caroline Wong

  13. A Doorman for Your Home Control Flow Integrity Means in Web Frameworks

    A Doorman for Your Home Control Flow Integrity Means in Web Frameworks

    1