Channel Avatar

OWASP Foundation @UCe8j61ABYDuPTdtjItD2veA@youtube.com

66K subscribers - no pronouns :c

Watch recordings from OWASP AppSec conferences and expand yo


04:49
OWASP Leaders Must Become Members
15:38
The History of the OWASP Developer Guide
08:04
OWASP Global Board of Directors Nomination Process
31:21
OWASP API Security Project - Paulo Silva & Erez Yalon
47:21
From Theory To Practice: Navigating The Challenges Of Vulnerability Research - Raphael Silva
01:54
Closing Ceremony - OWASP Board
45:37
What Can Traditional Web App Security Learn From Browser Wallet Extensions? - Gal Weizman
39:54
5 AppSec Stories, And What We Can Learn From Them - Paul Molin
29:58
OWASP SamuraiWTF - Kevin Johnson
48:03
Dawn Of The Dead: The Tale Of The Resurrected Domains - Pedro Fortuna
22:38
OWASP Coraza Web Application Firewalls Revisited - José Carlos Chávez
31:46
OWASP SAMM: Interactive Introduction And Update - Seba Deleersnyder & Bart De Win
47:45
Growing A Security Champion Program Into A Security Powerhouse - Bonnie Viteri
38:26
Cloud-Squatting: The Never-ending Misery Of Deleted & Forgotten Cloud Assets - Abdullah Al-Sultani
38:05
Exploiting Client-Side Path Traversal: CSRF Is Dead, Long Live CSRF - Maxence Schmitt
39:55
'The Rise And Fall' Of ModSecurity And The OWASP Core Rule Set - Davide Ariu
54:21
Deterministic GenAI Outputs With Provenance - Dinis Cruz
37:02
Build Strong Defenses By Participating In Standards! - Daniel Ehrenberg
47:04
I Can’t Cope! How OWASP Is Helping To Manage Vulnerability Overload - Anthony Harrison
26:44
Securing The Gateway And Mitigating Risks In LLM API Integration - Ayush Agarwal & Avneesh Hota
13:47
OWASP Developer Guide - Shruti Kulkarni
41:30
XZ Backdoor: Navigating The Complexities Of Supply Chain Attacks Detected By Accident - Yoad Fekete
48:01
Assessing 3rd Party Libraries More Easily With Security Scorecards - Niels Tanis
23:40
OWASP Dependency Track Fortifying The Supply Chain - Aravind Parappil & Vinod Anandan
45:51
How (Not) To Implement Secure Digital Identity: Study Of Poland's Digital ID System - Szymon Chadam
43:05
Designing Security And Privacy: A Dev's Guide To Threat Modeling With OWASP SAMM - Seba Deleersnyder
56:10
Building An Effective Application Penetration Testing Team - Ryan Armstrong
39:14
OWASP Cornucopia - Johan Sydseter
26:32
OWASP Dep-scan - Prabhu Subramanian
50:24
Winning Buy-In: Mastering The Art Of Communicating Security To Management - Ida Hameete
49:37
Malice In Chains: Supply Chain Attacks Using Machine Learning Models - Tom Bonner & Marta Janus
11:25
OWASP Top-25 Parameters - Lütfü Mert Ceylan
48:41
Token It Up A Notch: Elevating Payment Security - Yadi Abdalhalim & Jovon Itwaru
32:29
Cryptographic Governance: Software Supply Chain Security With CBOM - Nicklas Körtge
44:26
Maturing SDLC At A Fortune 500 Company Based On OWASP SAMM: Successes And Pitfalls - Jasyn Voshell
39:45
Transitive Vulnerabilities Exploit In Real-life - Liad Cohen & Eyal Paz
46:56
Modern Appsec vs. GenAI Application: Is Your Appsec Ready? - Balachandra Shanabhag
31:17
OWASP Low-Code/No-Code Top 10 (LCNC) - Michael Bargury
01:01:32
Leaders Meeting - OWASP Leaders
24:31
Back To The Future: Old Tricks Invading A New Attack Surface - Uriya Elkayam
45:04
Traceability In Cyber Security:Lessons Learned From The Medical Sector - Konstantinos Papapanagiotou
20:03
OWASP Mobile Application Security (MAS) - Sven Schleier & Carlos Holguera
41:53
OWASP Privacy Toolkit: Privacy Awareness In The Digital Age - Stefano Di Paola & Martino Lessio
45:43
Rollout Your Hardcoded Secrets Detection With Min Effort & Max Impact! - Yassine Ilmi & Arbër Salihi
31:49
OWASP Open Common Requirement Enumeration (OpenCRE) - Spyros Gasteratos & Paola Garcia Cardenas
34:55
AI Package Hallucination: Spreading Malicious Packages Using Generative AI - Bar Lanyado
30:36
OWASP DefectDojo - Matt Tesauro
46:52
Tracking And Hacking Your Career - Leif Dreizler & Misha Yalavarthy
34:29
Automating Security Test Cases Based On ASVS - Aram Hovsepyan
41:53
A Race To The Bottom: Database Transactions Undermining Your AppSec - Viktor Chuchurski
18:08
OWASP ModSecurity - Ervin Hegedüs
47:47
Security Champions And Experiments: Building Blocks For Cultural Change - Mads Andersen
39:00
Trust Cards For AI - Isabel Praça
35:24
Gridlock: The Dual-Edged Sword Of EV And Solar APIs In Grid Security - Vangelis Stykas
45:39
Navigating The Landscape Of Client-Side Request Hijacking On The Web - Soheil Khodayari
46:34
DOM Jungle - Can We Trust The UI? - Gal Weizman
41:31
Start Covering Your Bases And Stop Chasing APT Headlines - Avishay Zawoznik
23:36
OWASP IoT Security Testing Guide (ISTG) - Luca Pascal Rotsch
51:30
AI Is Just Software, What Could Possibly Go Wrong? - Rob Van Der Veer
51:46
Leveraging Psychological Needs For Building A Security Culture Amongst Developers - Juliane Reimann