๐Ÿงช Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Devsecops

Focus Areas: ๐Ÿ” Application Security โš™๏ธ DevSecOps
79
Total Entries
84
Contributors

Top Contributors

Vandana Verma Sehgal(4) Pravir Chandra(3) Anant Shrivastava(2) Devdatta Akhawe(2) Dhanith Krishna(2)

All Entries (79 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmarazuredevsecopsiam+1
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Spentestingapplication-pentestingvulnerability-assessment+1
2025-08-06Tool demoBlackhat Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs Source Code Satinder Khasriyaapi-securityweb-securityowasp+1
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Mannareverse-engineeringbinary-analysiscode-analysis+4
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumarthreat_modelingsecurity-architecturedevsecops+1
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solankicontainer-securitydockerstatic-analysis+4
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Dattastatic-analysissoftware-securitydevsecops+3
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Varun Sharma, Ashish Kurmici-cdincident-responsedevsecops+3
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Kumar Ashwinvulnerability-managementsecure-codingdevsecops+1
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-11-26TalkBlackhat Cyber Security & Resiliency: a perspective with emerging technologies and Innovation Atul Kumarcybersecurity-strategiesrisk-managementcyber-resilience+2
2024-11-26TalkBlackhat The Double Edge Sword - Cybersecurity & AI Karmendra Kohlisecurity-architecturerisk-managementdevsecops+1
2024-11-15TalkC0c0n CISO’s take on BYOAI Venugopal Parameswararisk-managementsecurity-governancecompliance+4
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+2
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+5
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1api-securitydevsecopsci-cd+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishnablockchain-securitysmart-contractssecure-development+3
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M Gdevsecopssecure-developmentstatic-analysis+3
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaramangovernancerisk-managementcompliance+3
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priyaweb-securityapi-securityaws+3
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwinsecure-developmentdevsecopsvulnerability-management+1
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorabdevsecopsci-cdcicd-pipeline+3
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutanisecure-developmentdevsecopssoftware-security+3
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Rohit Dhamankarrisk-managementsecurity-architecturesecurity-governance+1
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singhrisk-managementcybersecurity-strategiessecurity-architecture+4
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaramancloud-compliancegovernancerisk-management+2
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishnablockchain-securitysmart-contractssolidity+3
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B Rrisk-managementsecurity-architecturedevsecops
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkatapi-securitysecure-developmentdevsecops
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnadasecure-codingvulnerability-managementdevsecops+1
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B Prisk-managementcyber-resiliencesecurity-architecture+3
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgalvulnerability-managementsecure-codingdevsecops+1
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishnasecure-codingpentestingethical-hacking+2
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalliweb-securityowasppentesting+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Guptapentestingvulnerability-assessmentdevsecops
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyamzero-trustsecurity-architecturesecurity-governance+1
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgalowaspsecure-developmentdevsecops+3
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singhcode-reviewsecure-codingstatic-analysis+3
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathandevsecopssecure-developmentsoftware-security+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hattiauthenticationidentity-managementsecure-development+1
2019-09-13Talk44 Con One Person Army โ€“ Playbook on how to be the first Security Engineer at a company Video Kashish Mittaldevsecops
2019-09-13TalkGlobal App Sec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwatevulnerability-managementawssecurity-information-event-management+1
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgaldevsecopssecure-developmentci-cd+3
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastavadevsecops
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastavadevsecopssecure-coding
2018-10-19TalkApp Sec Day Australia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargavthreat_modelingdevsecops
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-01-31TalkOwasp App Sec California Hunter โ€“ Optimize your Pentesters time Video Kiran Shiraliapplication-pentestingpentestingvulnerability-management+1
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhanedevsecopscloudaws
2017-01-25TalkOwasp App Sec California DASTProxy: Donโ€™t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shiralidynamic-analysisdastdevsecops+2
2017-01-25TalkOwasp App Sec California OCSP Stapling in the Wild Devdatta Akhaweweb-securityvulnerability-managementsecurity-architecture+1
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basuauthenticationiamsecurity-architecture+1
2015-09-24TalkApp Sec Usa Continuous Cloud Security Automation Video Rohit Pitkeawsdevsecopssecurity-architecture+1
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekharsecure-developmentdevsecopscompliance+3
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawevulnerability-managementbug-bountysoftware-security+3
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookheysecure-codingsecure-developmentweb-security+3
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paulsecure-developmentdevsecopssoftware-security+2
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandraethical-hackingsecure-developmentdevsecops