This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
File list
This special page shows all uploaded files.
Date | Name | Thumbnail | Size | Description | Versions |
---|---|---|---|---|---|
20:25, 2 February 2018 | Modern DevOps and security.pptx (file) | 51 KB | 1 | ||
15:57, 25 September 2017 | Security Shepherd.pptx (file) | 5.43 MB | Secuirty Shepherd presentation from OWASP Newcastle UK meetup Sept 2017 | 1 | |
15:54, 25 September 2017 | Owasp threat dragon 201709 .pptx (file) | 1.41 MB | OWASP Threat Dragon Talk from Newcastle UK Chapter Meeting Sept 2017 | 1 | |
22:02, 30 November 2015 | OWASPNewcastle automated security testing using ZAP API.pptx (file) | 918 KB | 2 | ||
21:54, 30 November 2015 | OWASPNewcastle the problem with proving identity.pptx (file) | 4.34 MB | 1 | ||
21:51, 30 November 2015 | Owaspnewcastle-real world defence in depth.pptx (file) | 2.43 MB | 1 | ||
08:28, 1 October 2015 | CSP Newcastle Chapter Sept 2015.pdf (file) | 1.72 MB | 1 | ||
12:28, 30 September 2015 | PassiveDefense Newcastle Chapter Sept 2015.pdf (file) | 101 KB | 1 | ||
12:27, 30 September 2015 | OWASP Threat Dragon Newcastle Chapter Sept 2015.pptx (file) | 284 KB | 1 | ||
12:25, 30 September 2015 | OWASP Mobile Security Project Newcastle Chapter Sept 2015.pptx (file) | 1.81 MB | 1 | ||
08:55, 1 June 2015 | An introduction to penetration testing.pptx (file) | 1.37 MB | 2 | ||
13:09, 25 March 2015 | OWASP Compliance for Devs.pptx (file) | 3.4 MB | Andy Ward Security Compliance for Developers - Are we Certified... or Certifiable? Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to... | 1 | |
13:07, 25 March 2015 | Cognitive Bias and Security Vulnerabilities Presentation.pptx (file) | 4.74 MB | Neil Dixley "Cognitive bias and it's role in security vulnerabilities" An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us i... | 1 |