video
2dn
video2dn
Найти
Сохранить видео с ютуба
Категории
Музыка
Кино и Анимация
Автомобили
Животные
Спорт
Путешествия
Игры
Люди и Блоги
Юмор
Развлечения
Новости и Политика
Howto и Стиль
Diy своими руками
Образование
Наука и Технологии
Некоммерческие Организации
О сайте
Absolute AppSec
application security
software security
seth law
"The podcast for kids who can't appsec good and want to learn how to do other stuff good, too."
AppSec Topics: How Authorization Fails, an example from the Practical Secure-Code Review course
Absolute AppSec: AppSec Topics and Tips: Password Policies and the evolution of passwords in infosec
Application Security Tips and Topics: Memory safe or unsafe languages
VIRTUAL Secure Code Review Course
The State of (Absolute) AppSec at CactusCon11 on January 28, 2023
Ken Johnson (cktricky) demos AppMap (appmap.io), a run-time code visualization tool
Application Security How-To: Ken’s Secure-Code Review of an application codebase.
Topic: Fuzzing in Application Security Testing with Radamsa demo
Application Security Tips: Intro to Burpsuite, user name enumeration and brute-forcing passwords
Automated Static Analyzers in Secure Code Review with demonstration of Puma Scan (pumasecurity.io)
Tips and Topics for Application Security: Using Amass to enumerate assets and gather intel.
Browser Sanitization API from Mozilla, Google, and Cure53
Ransomware: Tips for Organizations and Application Security Professionals
Laura Huerta Migus / Drinking About Diversity or Equity Happy Hour
Clea Ostendorf / Insider Threat: When Intellectual Property Walks Out
Aaron Rinehart / Security Chaos Engineering: Improving Security by Experimenting with Failure
Evan Johnson / Implementing Zero Trust the Cloudflare Way
Jeff Williams / Getting Started with Security Observability
Naomi Buckwalter // Six Things DevOps Wants from InfoSec
Dominik 'disconnect3d' Czarnota // Various interesting (and not) bugs case studies
Jennifer Chermoshynuk & Jennie Steshenko / CAIQ & Cookies
Eric Johnson / Winning in the Dark - Defending Serverless Infrastructure in the Cloud
Adam Schaal / Automating Vulnerability Management - Midwinter Night's Con
Clint Gibler / How to Eradicate Vulnerability Classes with Secure Defaults + Lightweight Enforcement
Stefan Edwards / Sister Loji's Modeling School for Wayward InfoSec Youth - Midwinter Night's Con
Evan Sultanik / The Superabundant Benedictions of Programming an Absurd NES Game
Ksenia Peguero / Shifting left for Electron.js security - Midwinter Night's Con
WE USED TO HAVE CAKE, NOW WE'VE BARELY GOT ICING
Chronicles of True Risq: The Rise of Risq
Content Security Policy Going From Idea to Afterthought