33:28
SBOMs and Why They Can Help Make Your Software More Secure - Anthony Harrison
OWASP London
Shared 20/04/2024
21:43
Decoding Software Composition Analysis (SCA): Unveiling Pain Points in SCA - Kaiwen Jiang
OWASP London
Shared 20/04/2024
07:24
Installing OWASP Mutillidae II version 2.11.4 in Kali Linux using XAMP | Explore OWASP Top 10 Risks
Cyber Security & Ethical Hacking Skills
Shared 26/07/2023
42:26
Hackerñol - Series de Libertad - ZapProxy - Fuzzing y Tagging
Hackerñol Para Hackers en Español
Shared 18/11/2017
06:44
Software Signing and Verification with Sigstore - Sherif Clinch
OWASP London
Shared 12/05/2022
01:05:49
OWASP Dependency Track and CycloneDX SBOM Standard - Steve Springett
OWASP London
Shared 12/03/2022
54:30
Not All SBOMs Are Created Equal - Introducing JBOM - Jeff Williams
OWASP London
Shared 12/03/2022
01:20
What the Log?! So Many Events, So Little Time! - Miriam Wiesner
OWASP London
Shared 08/10/2021
56:43
Cryptographic protection of ML models in Mobile Apps - Anastasiia Voitova
OWASP London
Shared 17/09/2021
38:59
Teaching the OWASP Top 10 to Beginning Developers - Olivia Liddell
OWASP London
Shared 05/03/2021