Application Security - Challenging Traditional Approaches and Controls

Application Security - Challenging Traditional Approaches and Controls

OWASP Foundation via YouTube Direct link

Outro

32 of 32

32 of 32

Outro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Application Security - Challenging Traditional Approaches and Controls

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Organizations have no lack of relevancy
  3. 3 Loyalty bill hack
  4. 4 Statistics
  5. 5 Money
  6. 6 Software insecurity wrong
  7. 7 Asymmetric arms race
  8. 8 Traditional model
  9. 9 Too many variables
  10. 10 The accepted world
  11. 11 The attacker schedule
  12. 12 The idea of risk
  13. 13 Timelimited approach
  14. 14 Clientside tools
  15. 15 Internal tools
  16. 16 Cheeseburger analogy
  17. 17 Software food chain
  18. 18 Opensource vulnerability statistics
  19. 19 Spring vulnerability
  20. 20 Patch management
  21. 21 Biting off more
  22. 22 Large scale vulnerabilities
  23. 23 Where we are
  24. 24 Data consumption
  25. 25 Enterprise Security Intelligence
  26. 26 Information Flooding
  27. 27 Context
  28. 28 Compliance
  29. 29 Kinder Eggs
  30. 30 Legal in USA
  31. 31 Conclusion
  32. 32 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.