🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Secure Development

60
Total Entries
55
Contributors

Top Contributors

Vandana Verma Sehgal(4) Ajin Abraham(3) Pravir Chandra(3) Shreeraj Shah(3) Sumanth Naropanth(3)

All Entries (60 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chagantiweb-securitysecure-codingpentesting+3
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Dattastatic-analysissoftware-securitydevsecops+3
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Josephvulnerability-managementbug-bountysecure-development
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigammobile-securitypentestingapi-security+2
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1api-securitydevsecopsci-cd+3
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishnablockchain-securitysmart-contractssecure-development+3
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M Gdevsecopssecure-developmentstatic-analysis+3
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwinsecure-developmentdevsecopsvulnerability-management+1
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutanisecure-developmentdevsecopssoftware-security+3
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekarsecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathisecure-developmentdevsecopssoftware-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju Ksecure-developmentrisk-managementsecurity-architecture
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishnablockchain-securitysmart-contractssolidity+3
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkatapi-securitysecure-developmentdevsecops
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgalcode-reviewstatic-analysisreverse-engineering+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishnasecure-codingpentestingethical-hacking+2
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Vermapentestingvulnerability-assessmentapplication-pentesting+1
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgalowaspsecure-developmentdevsecops+3
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanathopensourcesecure-developmentdevelopment+5
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singhcode-reviewsecure-codingstatic-analysis+3
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurienfinancial-institutionssecure-developmentrisk-management+2
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathandevsecopssecure-developmentsoftware-security+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hattiauthenticationidentity-managementsecure-development+1
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkarmobile-securityios-securityapplication-pentesting+4
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgaldevsecopssecure-developmentAutomation+4
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharamaniotblueteamsecure-development
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftabsecure-developmentrisk-managementsecurity-architecture
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamwebblueteamsecure-development+6
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-01-25TalkOwasp App Sec California DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shiralidynamic-analysisdastdevsecops+3
2016-10-13TalkApp Sec Usa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharlamobile-securityvulnerability-managementreverse-engineering+1
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawanthadoopsecure-developmentblueteam
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekharsecure-developmentdevsecopscompliance+3
2015-01-27TalkOwasp App Sec California The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhaweweb-securityxsscsrf+3
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basusecure-developmentvulnerability-management
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhaweweb-securityxsscsrf+3
2013-11-20TalkApp Sec Usa Project Talk: OWASP OpenSAMM Project Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shahmobilecode-analysissecure-development+5
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwalblueteamthreat_modelingsecure-development
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandrasoftware-securitysecure-developmentdevsecops+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookheysecure-codingsecure-developmentweb-security+3
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumarxsssqliblueteam+2
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochharsecure-developmentsecure-coding
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paulsecure-developmentdevsecopssoftware-security+2
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shahblueteamwebfootprinting+3
2009-04-22TalkHitb Sec Conf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shahblueteamwebfootprinting+3
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+2
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandraethical-hackingsecure-developmentdevsecops
2003-12-12TalkHitb Sec Conf Defending Web Applications: Strategies, methods and practices Shreeraj Shahwebblueteamsecure-coding+2