Cybersecurity | Cloud | DevelopmentSimon Thorpe – Why using SMS in the authentication chain is risky – AppSecUSA 2016 December 31, 2020 video appsecappsecusaowasp
Cybersecurity | Cloud | DevelopmentRohit Pitke – Continuous Cloud Security Automation – AppSecUSA 2015 December 24, 2020 video appsecappsecusaowasp
Cybersecurity | Cloud | DevelopmentContinuous Cloud Security Monitoring (CCSM) – Michael Wylie October 30, 2020 video appsecappsec californiaappseccaliappseccaliforniaowasp
Cybersecurity | Cloud | DevelopmentLeveraging Blockchain for Identity and Authentication in IoT is good for Security – AppSecUSA 2017 October 22, 2020 video appsecowasp
Cybersecurity | Cloud | DevelopmentTest Driven Security in the DevOps pipeline – AppSecUSA 2017 October 17, 2020 video appsecowasp
Cybersecurity | Cloud | DevelopmentDaniel Somerfield – Turtles All the Way Down: Storing Secrets in the Cloud and the Data Center October 12, 2020 video appsecappsecusaowasp
Cybersecurity | Cloud | DevelopmentDefensible Application Security for the Artificial Intelligence Era – Chenxi Wang – AppSecUSA 2018 October 8, 2020 video appsecappsecusaKeynoteowasp
Cybersecurity | Cloud | DevelopmentWeb App Containers: Applied Threat Modeling – Richard Tychansky October 6, 2020 video appsecappsec californiaappseccaliappseccaliforniaowasp
Cybersecurity | Cloud | DevelopmentThinking Differently About Security – Mary Ann Davidson September 26, 2020 video appsecappsecusaAppsecusa 2013Mary Ann Davidsonowasp
Cybersecurity | Cloud | DevelopmentFrom the OWASP Top Ten(s) to the OWASP ASVS – Jim Manico August 21, 2020 video appsecappsec californiaappseccaliappseccaliforniaowasp