Все публикации

Keynote: Navigating the Intersection of Technology, Security, and Trust - Reeny Sondhi

Keynote: Red, Blue, and Purple AI - Jason Haddix

Keynote: Think Like a Hacker - Ted Harrington

Keynote: Thriving in the Age of AI - Aanchal Gupta

The History of the OWASP Developer Guide

OWASP API Security Project - Paulo Silva & Erez Yalon

Back To The Future: Old Tricks Invading A New Attack Surface - Uriya Elkayam

'The Rise And Fall' Of ModSecurity And The OWASP Core Rule Set - Davide Ariu

From Theory To Practice: Navigating The Challenges Of Vulnerability Research - Raphael Silva

Securing The Gateway And Mitigating Risks In LLM API Integration - Ayush Agarwal & Avneesh Hota

Cryptographic Governance: Software Supply Chain Security With CBOM - Nicklas Körtge

OWASP Dependency Track Fortifying The Supply Chain - Aravind Parappil & Vinod Anandan

OWASP Privacy Toolkit: Privacy Awareness In The Digital Age - Stefano Di Paola & Martino Lessio

5 AppSec Stories, And What We Can Learn From Them - Paul Molin

How (Not) To Implement Secure Digital Identity: Study Of Poland's Digital ID System - Szymon Chadam

Assessing 3rd Party Libraries More Easily With Security Scorecards - Niels Tanis

Rollout Your Hardcoded Secrets Detection With Min Effort & Max Impact! - Yassine Ilmi & Arbër Salihi

Transitive Vulnerabilities Exploit In Real-life - Liad Cohen & Eyal Paz

Building An Effective Application Penetration Testing Team - Ryan Armstrong

Dawn Of The Dead: The Tale Of The Resurrected Domains - Pedro Fortuna

Growing A Security Champion Program Into A Security Powerhouse - Bonnie Viteri

Paved Roads To Express RBAC In Threat Models - Eden Yardeni

Automating Security Test Cases Based On ASVS - Aram Hovsepyan

Navigating The Landscape Of Client-Side Request Hijacking On The Web - Soheil Khodayari