- Best of Ignite 2015 - How You Can Hack Proof Your Clients & Servers in a Day - Murray & Alshakarti
- Øredev 2013 - How attackers attack your smartphones and tablets
- Oredev 2014 - Coding in a world of cyber crime cyber threats and espionage
- Øredev 2014 - Coding in a world of cyber crime cyber threats and espionage
- Øredev 2014 - File Upload - Inviting the Vampires
- Øredev 2014 - Making Zombies
- Oredev 2014 - Man-in-the-browser attack demo on Android
- Øredev 2014 - Protecting your app data from attackers
- Øredev 2014 - Secure coding patterns
- Øredev 2014 - Security For Developers
- Øredev 2014 - Security in web apps
- Øredev 2014 - Where and how do we build our app
- [Private Video]
- [Private Video]
- [Private Video]
- Security Conference 2015 - Amazing advances in HTTPS are here. Now it’s your turn.
- Security Conference 2015 - Designing for Security through Threat Modelling
- Security Conference 2015 - File upload – Inviting the Vampires
- Security Conference 2015 - Full disclosure – rootpipe in OS X
- Security Conference 2015 - Improve Your Security by Running in the Cloud
- Security Conference 2015 - Keynote - Security in Your Code Defines the Future
- Security Conference 2015 - Lightweight Security Protocols for the Internet of Things
- Security Conference 2015 - Protecting your app data from attackers
- Security Conference 2015 - Secure APIs - Use identity management to handle mobile...
- Security Conference 2015 - Secure coding patterns
- Security Conference 2015 - Security in web apps
- Security Conference 2015 - Website Security
- Security Conference 2015 - Where and how do we build our app
- Security Summit 2013 | Bring your “Owned” device!
- Security Summit 2013 | Know your enemy! - Livedemonstration av Cyberattacker!
- Security Summit 2013 | Web application & Cloud vulnerabilities (OWASP TOP10)
- Security Summit 2014 - 1. Keynote
- Security Summit 2014 - 2. Hack a Mac, pwn an iPhone & void a Droid
- Security Summit 2014 - 3. Security in a shared infrastructure
- Security Summit 2014 - 4. Molnet = Web, Web = sårbart!
- Security Summit 2014 - 5. Hur många identiteter har dina användare?
- The Risk Of Cyber Intrusion From Hackers Through Passwords & Weak Credentials - Live Demo
- TrueSec Security Newscast - April 2015
- TrueSec Security Newscast - December 2014
- TrueSec Security Newscast - February 2015
- TrueSec Security Newscast - June 2015
- TrueSec Security Newscast - Oktober 2014