A somewhat curated list of links to various topics in application security.
Item | Date Added | Link | Excerpt |
---|---|---|---|
1 | 2025-08-14 04:31:24 UTC | Introducing the OWASP Nettacker Project - Speaker Deck | The content is an introduction to the OWASP Nettacker Project, presented on Speaker Deck. OWASP Nettacker is likely a cybersecurity project associated with the Open Web Application Security Project (OWASP). The presentation on Speaker Deck may provide an overview of the project's goals, features, and importance in the realm of cybersecurity. It aims to raise awareness about the project and potentially attract contributors or users interested in enhancing their security practices. |
2 | 2025-08-14 04:31:22 UTC | Gibler - An Opinionated Guide to Scaling Your Company's Security - Google S | The content provided is a title mentioning "Gibler - An Opinionated Guide to Scaling Your Company's Security - Google S." It appears to be a guide or resource focused on helping companies scale their security measures. The mention of "Google S" may suggest a connection to Google or a specific security initiative within Google. The content seems to emphasize the importance of enhancing security practices within a company as it grows and expands, possibly offering opinionated insights and recommendations on how to effectively manage and scale security measures. |
3 | 2025-08-14 04:31:20 UTC | Frans Rosén Keynote at BSides Ahmedabad - YouTube | Frans Rosén delivered a keynote speech at BSides Ahmedabad, which is available on YouTube. The content likely includes insights, information, or perspectives shared by Frans Rosén during the keynote address at the event. Viewers can watch the video to gain knowledge or understanding of the topics discussed by Frans Rosén at BSides Ahmedabad. |
4 | 2025-08-14 04:31:18 UTC | OWASP Videos | The content is concise and simply states "OWASP Videos," indicating that there are videos related to the Open Web Application Security Project (OWASP). OWASP is a non-profit organization focused on improving software security. The videos likely cover various topics related to web application security, such as best practices, vulnerabilities, and tools. Viewers can expect educational content on how to secure web applications and prevent security breaches. |
5 | 2025-08-14 04:31:16 UTC | The security phoenix - from the ashes of DEV-OPS Appsec California 20… | The content seems to discuss the concept of security rising like a phoenix from the challenges faced in the realm of DevOps and application security at the Appsec California 2020 event. It likely explores how security measures can evolve and improve despite setbacks, drawing parallels to the mythical phoenix that rises from its ashes. The content may delve into strategies for enhancing security practices in the context of DevOps and application security. |
6 | 2025-08-14 04:31:14 UTC | (186) @Jhaddix Talks About Defcon, Burp Suite, Hacking, Bug Bounties and Ho | The content discusses @Jhaddix's insights on Defcon, Burp Suite, hacking, bug bounties, and more in a concise manner. It likely covers topics related to cybersecurity, ethical hacking, and bug bounty programs. The content may provide valuable information and perspectives on these subjects from @Jhaddix's expertise. |
7 | 2020-01-31 22:27:08 UTC | OWASP Videos | The OWASP Foundation hosts videos on its website to educate about software security. OWASP is a nonprofit organization dedicated to enhancing software security. |
8 | 2020-01-31 22:26:01 UTC | Purple is the new black: Modern Approaches to Application Security | The content discusses modern approaches to application security, highlighting the concept that "purple is the new black." This phrase implies a shift towards a more comprehensive and integrated approach to security that combines traditional blue team (defenders) and red team (attackers) strategies. By adopting a "purple team" mindset, organizations can enhance their security posture by fostering collaboration between defensive and offensive security teams to better protect against cyber threats. |