#
Title
RETURN TO OVERVIEW PAGE
2020-07-11
Coding Expectations for Malware & Pentesting (29:47)
CODE – SECURITY & TESTING
2020-06-23
Secure Coding Practices to Prevent Vulnerabilities (1:01:05)
2020-06-20
Secure Coding [Carnegie Mellon University Software Engineering Institute (41:15)
2020-06-15
Intel Tiger Lake processors will thwart future Spectre and Meltdown attacks
2020-05-27
Software Security and Secure Coding Practices : Session 6: Web Security (1:59:30)
2020-05-21
Introduction to Secure Coding and OWASP Top 10 (1:35:10)
2020-05-05
Cybersecurity Challenge PL2020
2020-04-06
Innocent Vulnerabilities vs Malicious Backdoors: How to Manage Your Risk (56:16)
2020-02-13
Finding Business Logic Flaws, Data Leakage and Hard Coded Secrets in Development (54:40)
2019-11-28
Developing Cyber Resilient Systems: A Systems Security Engineering Approach
2019-11-03
Secure-Coding Workshop (1:45:12)
2019-10-16
Enabling Secure Code at Scale with Spring & OAuth2 (31:00)
2019-09-05
Secure-coding practices (58:49)
2019-07-25
Secure Coding in C/C++ (28:12)
2019-06-09
OWASP DevSlop Show: Security Code Review 101 (1:01:04)
2019-05-15
Coding Secure Code: Best Practices, Advice for Writing Secure Code (45:20)
2019-04-12
GPS Flaw: Security Expert Says He Won't Fly April 6
2019-03-05
Huge Risks From SaaS Orgs With No Test Regions or Change Controls (53:24)
2019-02-28
Secure Coding – Best Practices (57:44)
2019-02-19
No Change Control is Like Playing with Fire in a Dynamite Factory (56:10)
2019-02-08
Parenting site Mumsnet hit by data breach
2019-01-09
Secure Coding with JavaScript (1:21:48)
2019
RSA
2019 Survey: security not in application life cycle from start
2019
Veracode AppSec Knowledge Base (extensive resources)
2018
C++Now 2018: Matthew Butler “Secure-Coding Best Practices” (1:27:24)
2018
Learn DevOps and its Foundational Technologies (Veracode)
2018
Secure Coding
2018
Secure Programming Practices in C++ - NDC Security 2018 (51:34)
2018
Secure-Coding Best Practices (59:55)
2018
Secure-Coding Best Practices [for C++] (1:27:24)
2018
Secure-Coding Cheat Sheet
2018
Secure-Coding practices in Java: challenges and vulnerabilities
2018
Securing Code (SANS Reading Room resources)
2018
SEI CERT Coding Standards
2018
The Art of Secure Code
2018
The Top 12 Practices of Secure Coding
2018
Wells Fargo computer glitch blamed as hundreds lose their homes
2018
Writing Secure JavaScript (24:14)
2017
Debug Like a Champion
2017
Hungry penguins help keep car code safe
2017
New Security Control Enhancements Java 8 and 9 - Jim Manico (1:23:45)
2017
Scaling a Software Security Initiative (AppSec CA 2017 - Gary McGraw (50:42)
2017
Secure by Design: the Architect's Guide to Security Design Principles (43:56)
2017
Secure Coding - CERT
2017
Secure Coding - INFOSEC Institute
2017
Secure-Coding Guidelines - Microsoft
2017
Secure-Coding Practice Guidelines - UC Berkeley INFOSEC & Policy
2017
Secure-Coding Practices Quick Reference Guide - OWASP
2017
Security Best Practices for Serverless Applications - Justin Pirtle (40:41)
2017
Security Development Lifecycle and Static Code Analysis (31:53)
2017
SEI CERT Coding Standards
2017
Spring Security in a Spring Boot App with Example - Tech Primers (31:28)
2017
The OWASP Top Ten Proactive Controls - Jim Manico (1:24:29)
2017
Top 10 Secure-Coding Practices - CERT
2016
Addressing Security Vulnerabilities at the Source - PRQA [signup req'd]
2016
Advances in Secure-Coding Frameworks (AppSec CA 2016) - Jim Manico (46:37)
2016
Amazon gadget hijacks owner's heating after hearing radio report
2016
Dilbert & e-voting
2016
DON'T SET YOUR IPHONE BACK TO 1970, NO MATTER WHAT
2016
Five Principles for Securing DevOps - Veracode [signup req'd]
2016
Hacking Lottery Machines - Schneier on Security
2016
Microsoft 'deeply sorry' for offensive tweets by AI chatbot
2016
New website lets anyone spy on Tinder
2016
Nissan disables Leaf app after hack risk revealed online - BBC News
2016
Overview: Trustwave Managed Security Testing (2:02)
2016
Secure-Coding Patterns - Andreas Hallberg (50:25)
2016
UC Berkeley profs lambast new “black box” network monitoring hardware
2015
9 Secure-Coding Practices You Can’t Ignore - Checkmarx
2015
Automated Software Testing for the 21st Centure (32:26)
2015
Security is the loser in the holy war between Android and Apple
2015
Test Automation Implementation Strategy (54:49)
2015
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware (47:30)
2015
Volkswagen Scandal Confirms the Dangers of Proprietary Code | David Bollier
2014
Test Automation Frameworks using Open Source Tools (53:18)
2012
Automated Security Testing (34:38)
2012
Beyond Scanning: Automated Web Application Security Testing (47:37)
2012
Test Automation -- 10 (sometimes painful) Lesson Learned (45:41)