The Cyberattack on Visma in 2018, experience sharing and views from the blue team – Espen Johansen
February 12th, 2020 📆 | 5972 Views ⚑
The presentation seeks to share and discuss some details of the attack against Visma seen from the Blue side and
February 12th, 2020 📆 | 5972 Views ⚑
The presentation seeks to share and discuss some details of the attack against Visma seen from the Blue side and
February 12th, 2020 📆 | 2452 Views ⚑
At NDC Security two years ago we looked at some of the lesser known web application vulnerabilities that were arising
May 23rd, 2019 📆 | 5440 Views ⚑
With the emerging popularity of bug bounty programs, lesser known and even brand new vulnerability classes are gaining popularity. This
April 13th, 2019 📆 | 5006 Views ⚑
With the emerging popularity of bug bounty programs, lesser known and even brand new vulnerability classes are gaining popularity. This
April 8th, 2019 📆 | 8250 Views ⚑
What would happen if we allowed 50 hackers from around the world to hack into our web applications? Is this
November 2nd, 2018 📆 | 2876 Views ⚑
OWASP illustrates that developers keep making the same mistakes over and over again, but what about more esoteric vulnerabilities? In
August 27th, 2018 📆 | 7759 Views ⚑
Security is strongest when baked into the Software Development Lifecycle. This talk will focus on how to embed security early
February 5th, 2018 📆 | 2388 Views ⚑
With the emerging popularity of bug bounty programs, lesser known and even brand new vulnerability classes are gaining popularity. This
September 25th, 2017 📆 | 2167 Views ⚑
OWASP illustrates that developers keep making the same mistakes over and over again, but what about more esoteric vulnerabilities? In
Comments