- 11,000 Voices: Experts Shed Light on 4-Year Open Source & AppSec Survey - OWASP AppSecUSA 2014
- Anatomy of memory scraping credit card stealing POS malware - OWASP AppSecUSA 2014
- AppSec Survey 2.0 : FineTuning an AppSec Training Program Based on Data cut - OWASP AppSecUSA 2014
- AutoScaling Web Application Security in the Cloud - OWASP AppSecUSA 2014
- Blended Web and Database Attacks on Real-time, In-Memory Platforms - OWASP AppSecUSA 2014
- Bringing a Machete to the Amazon - OWASP AppSecUSA 2014
- Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information
- Catch me if you can: Building a Web Malware Analyzer using Machine Learning - OWASP AppSecUSA 2014
- Clientside security with the Security Header Injection Module SHIM - OWASP AppSecUSA 2014
- Cloud Security at Scale and What it Means for Your Application - OWASP AppSecUSA 2014
- DevOps and Security: The Facts, The Myths, The Legend - OWASP AppSecUSA 2014
- From the Ground Up - OWASP AppSecUSA 2014
- Ground Truths of a Rugged DevOps Practitioner - OWASP AppSecUSA 2014
- Hacking .NET(C#) Applications: The Black Arts (ASM attacks) - OWASP AppSecUSA 2014
- Hacking the Oracle Application Framework - OWASP AppSecUSA 2014
- Headless Browser Hide and Seek - OWASP AppSecUSA 2014
- IEEE Computer Societys Center for Secure Design - OWASP AppSecUSA 2014
- iOS App Integrity: Got Any? - OWASP AppSecUSA 2014
- Lean Security for Small or Medium Sized Business - OWASP AppSecUSA 2014
- Mobile Security Attacks: A Glimpse from the Trenches - OWASP AppSecUSA 2014
- Modern Web Application Defense with OWASP Tools - AppSecUSA 2014
- Not Go Quietly Adaptive Strategies and Unlikely Teammates - OWASP AppSecUSA 2014
- OWASP A9: A Year Later - Are you still using components with known vulnerabilities? - AppSecUSA 2014
- OWASP AppSecUSA 2014 - Keynote: Bruce Schneier - The Future of Incident Response
- OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security
- OWASP AppSecUSA 2014 - Keynote: OWASP Global Board
- OWASP AppSecUSA 2014 - Keynote: Renee Guttmann - CISO Perspectives
- Project Monterey or How I Learned to Stop Worrying and Love the Cloud - OWASP AppSecUSA 2014
- Red Phish, Blue Phish: Improved Phishing Detection Using Perceptual Hashing - AppSecUSA 2014
- Reversing Engineering a Web Application - For Fun, Behavior & WAF Detection - OWASP AppSecUSA 2014
- Runtime Manipulation of Android and iOS Applications - OWASP AppSecUSA 2014
- Static Analysis for Dynamic Assessments - OWASP AppSecUSA 2014
- Stop Chasing Vulnerabilities - Introducing Continuous Application Security - OWASP AppSecUSA 2014
- SWAMP & Partners Panel Discussion - AppSec USA 2014 - 18 Sept 2014
- Ten Secrets to Secure Mobile Applications - OWASP AppSecUSA 2014
- The DevOps of Everything - OWASP AppSecUSA 2014
- Threat Modeling Made Interactive - OWASP AppSecUSA 2014
- Top 10 Web Hacking Techniques of 2013 - OWASP AppSecUSA 2014
- Use After Free Exploitation - OWASP AppSecUSA 2014
- Warning Ahead: Security Storms are Brewing in Your JavaScript - OWASP AppSecUSA 2014
- When you can't afford 0days: Client-side exploitation for the masses - OWASP AppSecUSA 2014
- Where the Security Rubber Meets the DevOps Road - OWASP AppSecUSA 2014
- Your Password Complexity Requirements are Worthless - OWASP AppSecUSA 2014