LASCON 2010 Oct. 28, 2010 to Oct. 28, 2010, Austin, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Matt Tesauro | Keynote | |
Why Ha.Ckers.Org Doesn’T Get Hacked | James Flom | Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based ... | Security Analysis |
Anatomy Of A Logic Flaw | Charles Henderson , Garrett Held | Traditional vulnerabilities like SQL Injection, buffer overflows, etc, have well established techniques for discovery and ... | Exploitation Security |
Deconstructing Coldfusion | Chris Eng | ColdFusion is a somewhat forgotten but still very prevalent web application development platform. This presentation ... | Security Web Application Security |
Https Can Byte Me | Robert J. Hansen , Josh Sokol | HTTPS was created to protect confidentiality and prove integrity of content passed over the web. ... | Security Web Browser |
How I Met Your Girlfriend | Samy Kamkar | How I Met Your Girlfriend: The discovery and execution of entirely new classes of attacks ... | Mobile Security Web Firewall Privacy Risk |
Conducting An Instiution-Wide, Multi-Department Application Security Assessment | Jay Paz , Charlie Scott | From early 2009 until mid-2010, the Information Security Office at the University of Texas at ... | Application Security Analysis |
Mitigating Business Risks With Application Security | Joe Jarzombek | With today’s global IT software supply chain, project management and software/systems engineering processes must explicitly ... | Security Application Security Business |
Everything Useful I Learned About Software Security, I Learned At Microsoft! | Michael Howard | In this talk, Michael will discuss some of the things he has learned over the ... | Security Others Deep Knowledge Development |
Security Religions And Risk Windows | Erik Pace Birkholz | There is a difference between what is possible and what is probable, something we often ... | Security Risk |
Technology And Business Risk Management: How Application Security Fits In | Peter Perfetti | This presentation demonstrates how important application security is to the overall stability and security of ... | Security Application Security Risk Business |
Owasp Top 10: What Is It All About? | Dean Bushmiller | Everyone knows exactly what the OWASP top ten security threats are, right? Well sort of... ... | Security Others Deep Knowledge |
Automating Web Testing Beyond Owasp Webscarab Using Python | Brad Causey | This presentation will illustrate ways to improve web security assessments by using advanced features in ... | Development Others |
Tell Me Your Ip And I Will Tell You Who You Are | Noa Bar-yosef | IP addresses have been traditionally considered an unreliable method for attack detection. The unreliability is ... | Security Web Privacy |
Enhancing Web Application Security Using Another Factor | Asad Ali , Karen Lu | As web applications have become a necessity of contemporary societies, there is an increasing need ... | Web Application Security |
Why The Cloud Is More Secure Than Your Existing Systems | Ernest Mueller | Security is frequently cited as the #1 hindrance to the adoption of cloud computing. Much ... | Security Others Cloud |