Security10 Videos

Future Tech 2019: Brenno de Winter – Resilience starts with code. Any attack starts with code

Bad code installed and smart exploits created. As soon as espionage or other APT’s are involved vague terms, lack of understanding and especially fear kick in. Common sense dictates other behavior. In this talk we focus on what we can do, what we should do and especially what you can do. Surviving digital xenophobia begins with replacing […]

J-Fall 2018: Simon Maple – Common vulnerabilities you wish your Java app didn’t have!

This session takes some of the most common vulnerabilities found in the Java eco-system, breaks them down and shows how simple code can exploit them. We’ll look at examples in the wild that have been exposed, some more famously than others, before showing you how to guard against these important security issues. Simon Maple Simon […]

J-Fall 2018: Maarten Mulders – SSL/TLS for Mortals

Using Transport Layer Security (TLS) the right way is often a big hurdle for developers. We prefer to have that one colleague perform “something with certificates”, because he/she knows how that works. But what if “that one colleague” is enjoying vacation and something goes wrong with the certificates? In this session we’ll take a close […]

J-Spring 2018: Siren Hofvander – Making cookies healthy. Security in a web based world

Our world has grown more complicated since cookies were first baked into web browsers as a way around state-based obstacles and sessions. In the intervening years they have held everything from unsecured administrative credentials to language preferences and even our window scroll location. But while the wild-west years of plaintext credential storage are hopefully over, […]

J-Spring 2018: Simon Maple – Common vulnerabilities you wish your Java app didn’t have!

This session takes some of the most common vulnerabilities found in the Java eco-system, breaks them down and shows how simple code can exploit them. We’ll look at examples in the wild that have been exposed, some more famously than others, before showing you how to guard against these important security issues. Bio Simon: Simon […]

FutureTech Preview

Future Tech is the new conference for and by Developers and IT professionals who work with Microsoft technologies (C#, .NET Framework and web technologies). Future Tech is the event in the Netherlands for everyone who has passions for tech! The main goal of Future Tech is to share all the available knowledge, ideas, know-how about […]

J-Fall 2015 Speaker Gerke Kok – Identity and Access Management in the 21st century

Java EE applicaties zijn vaak afgeschermd. Iedereen heeft wel eens te maken gehad met identificatie van gebruikers. Het is heel verleidelijk om een simpel tabelletje te maken met username en wachtwoord. Maar dan begint het werk pas. Is het wel veilig? En wat als men het wachtwoord vergeten is? Kunnen we niet met Facebook inloggen? […]

J-Fall 2017 Speaker Rudy de Busscher – Getting started with Java EE Security API

This session starts with a short overview of the concepts which are defined within the new Java EE Security API (JSR-375) Once we all know what we are talking about, some example applications will be shown to illustrate these concepts. They will use a variety of external systems (like a database, LDAP server, Google OAuth2, […]

J-Fall 2016 Speaker Luuk Buit – Web application security voor developers: tooling en best practices

Heel vervelend: vlak voordat je live gaat wordt er nog een pentest uitgevoerd en op het allerlaatste moment mag jij nog wat security problemen oplossen. Herkenbaar? Het zou veel beter zijn als je tijdens het ontwikkelen al direct veilige software schrijft. Je zit dan nog helemaal in de flow en hoeft er later niet meer […]

J-Fall 2016 Speaker Ruben van Vreeland – How we Hacked LinkedIn and What Happened Next

The greatest web companies are ramping up their security, and for good reason. In this talk we will go into and advanced XSS attack on LinkedIn with demo’s dissecting how it works. A talk from the hacker himself, that ends with practical mitigations and common pitfalls. Finally, we will zoom out and reflect on how […]