Empowering Junior Testers: Strategies For Uncovering Critical Vulns In Web Applications - Tom Stacey
27:41
OfCORS! How To Do Cross Origin Resource Sharing (im)properly. - Cory Turner
42:05
Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale - Ross Bevington
59:46
Become a better security engineer (by not doing security) - Kane Narraway
28:33
Tales Of DOMinica - Liam Follin
40:47
Cloaked In Pixels: Concealing Payloads With Steganography - Ben Folland
28:27
DevOps in practice for beginners by Donnie Prakoso
42:22
The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies - Richard Foster
37:33